US20080313371A1 - Method and system for compression of data for block mode access storage - Google Patents
Method and system for compression of data for block mode access storage Download PDFInfo
- Publication number
- US20080313371A1 US20080313371A1 US12/194,678 US19467808A US2008313371A1 US 20080313371 A1 US20080313371 A1 US 20080313371A1 US 19467808 A US19467808 A US 19467808A US 2008313371 A1 US2008313371 A1 US 2008313371A1
- Authority
- US
- United States
- Prior art keywords
- data
- logical unit
- storage
- compressed
- virtual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/10—Program control for peripheral devices
- G06F13/12—Program control for peripheral devices using hardware independent of the central processor, e.g. channel or peripheral processor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0608—Saving storage space on storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/061—Improving I/O performance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00007—Time or data compression or expansion
Definitions
- This invention relates to computing systems and, in particular, to a method and apparatus facilitating compression and operation on compressed data over block storage protocols.
- block mode access architecture the communication between a server/client and a storage medium occurs in terms of blocks; information is pulled block by block directly from the disk.
- the operation system keeps track of where each piece of information is on the disk, while the storage medium is usually not aware of the file system used to organize the data on the device.
- the data are directly accessed from the disk by that processor which knows where each block of data is located on the disk and how to put them together.
- block mode access storage technologies are DAS (Direct Attached Storage), SAN (Storage Area Network), Block Storage over IP (e.g. FCIP, iFCP, iSCSI, etc.), intra-memory storage, etc.
- File access requires the server or client to request a file by name, not by physical location.
- a storage medium external storage device or storage unit within computer
- a storage medium is usually responsible to map files back to blocks of data for creating, maintaining and updating the file system, while the block access is handled “behind the scene”.
- the examples of file access storage technologies are NAS (Network Attached Storage with NFS, CIFS, HTTP, etc. protocols), MPFS (Multi-Pass File Serving), intra-computer file storage, etc.
- the file access storage may be implemented, for example, for general purpose files, web applications, engineering applications (e.g. CAD, CAM, software development, etc.), imaging and 3D data processing, multi-media streaming, etc.
- Object access further simplifies data access by hiding all the details about block, file and storage topology from the application.
- the object access occurs over API integrated in content management application.
- the example of object access storage technology is CAS (Content Addressed Storage).
- More efficient use of storage may be achieved by data compression before it is stored.
- Data compression techniques are used to reduce the amount of data to be stored or transmitted in order to reduce the storage capacity and transmission time respectively. Compression may be achieved by using different compression algorithms, for instance, a standard compression algorithm, such as that described by J. Ziv and A. Lempel, “A Universal Algorithm For Sequential Data Compression,” IEEE Transactions on Information Theory, IT-23, pp. 337-343 (1997). It is important to perform compression transparently, meaning that the data can be used with no changes to existing applications. In either case, it is necessary to provide a corresponding decompression technique to enable the original data to be reconstructed and accessible to applications. When an update is made to a compressed data, it is generally not efficient to decompress and recompress the entire block or file, particularly when the update is to a relatively small part of data.
- U.S. Pat. No. 5,761,536 discloses a system and method for storing variable length objects such that memory fragmentation is reduced, while avoiding the need for memory reorganization.
- a remainder of a variable length object may be assigned to share a fixed-size block of storage with a remainder from another variable length object (two such remainders which share a block are referred to as roommates) on a best fit or first fit basis.
- One remainder is stored at one end of the block, while the other remainder is stored at the other end of the block.
- the variable length objects which are to share a block of storage are selected from the same cohort.
- This association may be that the objects are from the same page or are in some linear order spanning multiple pages, as examples.
- Information regarding the variable length objects of a cohort is stored in memory.
- U.S. Pat. No. 5,813,011 discloses a method and apparatus for storing compressed data, wherein compressed file consists of: a header that carries information showing the position of a compression management table; compressed codes; and the compression management table that holds information showing the storage location of the compressed code of each original record.
- U.S. Pat. No. 5,813,017 discloses a method and means for reducing the storage requirement in the backup subsystem and further reducing the load on the transmission bandwidth where base files are maintained on the server in a segmented compressed format.
- the file is transmitted to the server and compared with the segmented compressed base version of the file utilizing a differencing function but without decompressing the entire base file.
- a delta file which is the difference between the compressed base file and the modified version of the file is created and stored on a storage medium which is part of the backup subsystem.
- U.S. Pat. No. 6,092,071 (Bolan et al.) discloses a system for control of compression and decompression of data based upon system aging parameters, such that compressed data becomes a system managed resource with a distinct place in the system storage hierarchy.
- Processor registers are backed by cache, which is backed by main storage, which is backed by decompressed disk storage, which is backed by compressed disk storage then tape, and so forth.
- Data is moved from decompressed to compressed form and migrated through the storage hierarchy under system control according to a data life cycle based on system aging parameters or, optionally, on demand: data is initially created and stored; the data is compressed at a later time under system control; when the data is accessed, it is decompressed on demand by segment; at some later time, the data is again compressed under system control until next reference. Large data objects are segmented and compression is applied to more infrequently used data.
- U.S. Pat. No. 6,115,787 discloses a disk storage system, wherein data to be stored in the cache memory is divided into plural data blocks, each having two cache blocks in association with track blocks to which the data belongs and are compressed, thus providing the storage of plural compressed records into a cache memory of a disk storage system in an easy-to-read manner.
- the respective data blocks after the compression are stored in one or plural cache blocks.
- Information for retrieving each cache block from an in-track address for the data block is stored as part of retrieval information for the cache memory.
- the cache block storing the compressed data block is determined based on the in-track address of the data block and the retrieval information.
- U.S. Pat. No. 6,349,375 discloses a combination of data compression and decompression with a virtual memory system.
- a number of computer systems are discussed, including so-called embedded systems, in which data is stored in a storage device in a compressed format.
- the virtual memory system In response to a request for data by a central processing unit (CPU), the virtual memory system will first determine if the requested data is present in the portion of main memory that is accessible to the CPU, which also happens to be where decompressed data is stored. If the requested data is not present in the decompressed portion of main memory, but rather is present in a compressed format in the storage device, the data will be transferred into the decompressed portion of main memory through a demand paging operation. During the demand paging operation, the compressed data will be decompressed. Likewise, if data is paged out of the decompressed portion of main memory, and that data must be saved, it can also be compressed before storage in the storage device for compressed data.
- U.S. Pat. No. 6,532,121 discloses a compression system storing meta-data in the compressed record to allow better access and manage merging data. Markers are added to the compression stream to indicate various things. Each compressed record has a marker to indicate the start of the compressed data. These markers have sector number as well as the relocation block numbers embedded in their data. A second marker is used to indicate free space. When compressed data is stored on the disk drive, free space is reversed so that future compression of the same, or modified, data has the ability to expand slightly without causing the data to be written to a different location. Also the compressed data can shrink and the remaining space can be filled in with this free space marker. A third type of marker is the format pattern marker. Compression algorithms generally compress the format pattern very tightly. However, the expectation is that the host will write useful data to the storage device. The compressor is fed typical data in the region of the format pattern, but a marker is set in front of this data to allow the format pattern to be returned rather than the typical data.
- U.S. Pat. No. 6,584,520 discloses a method of storage and retrieval of compressed files. The method involves dynamically generating file allocation table to retrieve compressed file directly from compact disk read only memory.
- U.S. Pat. No. 6,678,828 discloses a secure network file access appliance supporting the secure access and transfer of data between the file system of a client computer system and a network data store.
- An agent provided on the client computer system and monitored by the secure network file access appliance ensures authentication of the client computer system with respect to file system requests issued to the network data store.
- the secure network file access appliance is provided in the network infrastructure between the client computer system and network data store to apply qualifying access policies and selectively pass through to file system requests.
- the secure network file access appliance maintains an encryption key store and associates encryption keys with corresponding file system files to encrypt and decrypt file data as transferred to and read from the network data store through the secure network file access appliance.
- U.S. Patent Application No. 2004/030,813 discloses a method and system of storing information, includes storing main memory compressed information onto a memory compressed disk, where pages are stored and retrieved individually, without decompressing the main memory compressed information.
- U.S. Patent Application No. 2005/021,657 discloses a front-end server for temporarily holding an operation request for a NAS server, which is sent from a predetermined client, is interposed between the NAS server and clients on a network.
- This front-end server holds information concerning a correlation among data files stored in the NAS server, optimizes the operation request received from the client based on the information, and transmits the operation request to the NAS server.
- a compression system and method of operation thereof for use in a storage network comprising a plurality of network elements and operable with a block mode access storage protocol (e.g. SCSI, Fiber Channel, FCIP, iFCP, iSCSI, etc.).
- the compression system is operatively coupled to at least one computer and to one or more storage devices configured as at least one storage logical unit accommodating data compressed by the compression system, while the computer, the storage devices and the compression system are configured as separate network elements.
- the method of operating such compression system comprises:
- the method further comprises reporting the size and free capacity of the virtual logical unit in reply to a capacity status request from the computer to the storage logical unit. Accordingly, the method further comprises generating a header of the storage logical unit, said header holding information related to the size of the virtual logical unit.
- the compression system comprises means for compressing raw data to be stored in said at least one storage logical unit; means for creating and holding a virtual logical unit, said virtual logical unit configured to virtually represent in non-compressed form the data stored in the storage logical unit, wherein a size of the virtual logical unit corresponds to an estimated size of raw data which, being compressed, would substantially amount to a size of the storage logical unit; means for intercepting data access-related requests from said at least one computer addressed to the storage logical unit and addressing said request to the virtual logical unit; and means for facilitating mapping between the compressed data and their virtual accommodation at the virtual logical unit.
- the compression system may be coupled to the storage logical unit in a serial manner, and be configured to act as a transparent bridge in respect to the stored data.
- the compression system is further configured to report the size and free capacity of the virtual logical unit in reply to a capacity status request from the computer to the storage logical unit.
- At least part of the compression system may be integrated with a communication device capable to be configured as a network element of the storage network.
- system may be a suitably programmed computer.
- the invention contemplates a computer program being readable by a computer for executing the method of the invention.
- the invention further contemplates a machine-readable memory, tangibly embodying a program of instructions executable by the machine for executing the method of the invention.
- FIGS. 1 a ), 1 b ) 1 c are schematic block diagrams of typical block mode access storage architectures as known in the art.
- FIGS. 2 a ), 2 b ) and 2 c ) are schematic block diagrams of storage architectures in accordance with certain embodiments of the present invention.
- FIG. 3 is a schematic block diagram of the system functional architecture in accordance with certain embodiments of the present invention.
- FIG. 4 is a schematic diagram of virtual logical unit and logical unit in accordance with certain embodiments of the present invention.
- FIG. 5 is an exemplary structure of section table in accordance with certain embodiments of the present invention.
- FIG. 6 is a generalized flowchart of operation of compressed data block creation in accordance with certain embodiments of the present invention.
- FIG. 7 is a generalized flowchart of read operation on a compressed data block in accordance with certain embodiments of the present invention.
- FIG. 8 is a generalized flowchart of write operation on a compressed data block in accordance with certain embodiments of the present invention.
- FIG. 9 is a generalized flowchart illustrating sequence of write operation on a compressed section in accordance with certain embodiments of the present invention.
- FIG. 10 is a generalized flowchart of CLU management in accordance with certain embodiments of the present invention during disconnecting from a storage logical unit.
- FIGS. 11 a - 11 c are schematic illustrations of relationship between CLUs and assigned disk memory segments in accordance with certain embodiments of the present invention.
- Embodiments of the present invention may use terms such as processor, computer, apparatus, system, sub-system, module, unit, device (in single or plural form) for performing the operations herein.
- This may be specially constructed for the desired purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer.
- Such a computer program may be stored in a computer readable storage medium such as, but not limited to, any type of disk including, optical disks, CD-ROMs, magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), electrically programmable read-only memories (EPROMs), electrically erasable and programmable read only memories (EEPROMs), magnetic or optical cards, or any other type of media suitable for storing electronic instructions, and capable of being coupled to a computer system bus.
- a computer readable storage medium such as, but not limited to, any type of disk including, optical disks, CD-ROMs, magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), electrically programmable read-only memories (EPROMs), electrically erasable and programmable read only memories (EEPROMs), magnetic or optical cards, or any other type of media suitable for storing electronic instructions, and capable of being coupled to a computer system bus.
- FIG. 1 a - 1 c illustrating block diagrams of typical block mode access storage architectures as known in the art.
- FIG. 1 a illustrates typical DAS (Direct Attached Storage) architecture wherein a storage device 12 is directly connected to a computer 11 by connectivity media via block mode access storage protocols (e.g. SCSI, Fiber Channel, etc.). This direct connection provides fast access to the data; however, storage is only accessible from that server.
- DAS includes, for example, the internally attached local disk drives or externally attached RAID (redundant array of independent disks) or JBOD (just a bunch of disks).
- FIG. 1 b illustrates typical architecture of Storage Area Network (SAN) providing access to storage subsystems using block mode access storage protocols.
- the storage subsystems include host computer(s) 11 (typically with host bus adapters (HBAs)), FC network (SAN) 13 for routing the storage traffic and storage device(s) 12 .
- HBAs host bus adapters
- SAN FC network
- the storage subsystems are generally available to multiple hosts at the same time.
- FIG. 1 c illustrates typical architecture of storage network based on iSCSI protocol which enables transport of block data between computer(s) 11 and the storage device(s) 12 over IP network 14 without the need for a specialized network infrastructure, such as, for example, Fiber Channel.
- FIGS. 2 a - 2 c there are illustrated, by way of non-limiting examples, schematic diagrams of storage architecture in accordance with certain embodiments of the present invention.
- FIG. 2 a illustrates certain embodiments of the present invention for DAS storage architecture illustrated in FIG. 1 a
- FIG. 2 b illustrates certain embodiments of the present invention for SAN storage architecture illustrated in FIG. 1 b
- FIG. 2 c illustrates certain embodiments of the present invention for iSCSI storage architecture illustrated in FIG. 1 c .
- a compression system 20 is coupled to the computer(s) 11 (e.g. directly to the computer or the respective LAN, indirectly via storage network 13 , IP network 14 , etc.) via interface 21 and to the storage device(s) via interface 22 .
- the compression system 20 acts as a bridge between the computer(s) and the storage device(s).
- the platform 20 may support any physical interfaces (e.g. Ethernet, Fiber Channel, etc.) and may be configured to preserve the storage device features such as, for example, redundancy, mirroring, snapshots, failover, rollback, management, etc.
- the platform may be configured for seamless integration with existing network infrastructure. A user need not be aware of the compression and decompression operations and the storage location of compressed data.
- the compression system is configured to intercept communication between the computer(s) and the storage device(s), and to derive and compress data blocks corresponding to the data access-related request.
- the compression system 20 is configured to transfer selected control-related requests (e.g. format disk, de-fragment disk, take a snapshot, etc.) between the computer and the storage device in a transparent manner, while intervening in data access-related transactions (e.g. read, write, etc.) and some control related transactions (e.g. capacity status, etc.)
- selected control-related requests e.g. format disk, de-fragment disk, take a snapshot, etc.
- data access-related transactions e.g. read, write, etc.
- control related transactions e.g. capacity status, etc.
- the compression system 20 may also be configured to compress only selected passing blocks of data in accordance with pre-defined criteria (e.g. LUN number, size, IP address, type of data, etc.).
- pre-defined criteria e.g. LUN number, size, IP address, type of data, etc.
- the raw data (or their relevant part) are compressed by the compression system 20 during or before writing to the storage device 12 .
- the compressed data (or their relevant part) are decompressed by the compression system 20 during or after reading from the storage device 12 .
- a storage disk or a set of disks may be conceptually divided in logical unit(s).
- Logical units can directly correspond to a volume drive, to a host application, storage device, etc. and constitute a logical representation of physical storage.
- Each logical unit has an address, known as the logical unit number (LUN), which allows it to be uniquely identified. Users can determine whether a LUN is a disk drive, a number of disk drives, a partition on a disk drive, etc.
- the compression system 20 is configured to create in respect to at least one logical unit (LU) a corresponding virtual logical unit (VLU) with a size larger than the size of LU.
- a ratio between the size of LU and VLU is defined in accordance with expected compression rate; accordingly, the size of the VLU corresponds to the estimated size of raw data which, being compressed, would substantially amount to the LU size.
- a typical ratio between size of VLU and LU is estimated as 3 for e-mails, as 8 for a database data, etc.
- the compression system addresses data access-related requests from the computer to the VLU instead the LU and the VLU provides virtual accommodation of raw data.
- the computer's operating system OS
- the compression system will compress the corresponding data to the LU of the storage device and facilitate mapping between the compressed data and their virtual representation at the VLU.
- the invention is not bound by the specific architecture described with reference to FIGS. 1 and 2 .
- Those versed in the art will readily appreciate that the invention is, likewise, applicable to any computing systems and any storage network architecture comprising block storage protocols (e.g. SCSI, Fiber Channel, iSCSI, etc.).
- the functions of the compression system 20 may be implemented in a stand-alone server(s) (as illustrated in FIGS. 2 a - 2 c ), distributed between several platforms or integrated within other storage network elements (e.g. file servers, enterprise switches, etc.).
- FIG. 3 illustrates a schematic functional block diagram of the compression system 20 in accordance with certain embodiments of the present invention.
- the compression system comprises an Input/Output (I/O) block 31 coupled to a session manager 32 .
- the I/O block gets data access-related requests (e.g. read, write, etc.) and forwards them to the session manager.
- a session starts by LUN capacity request (e.g. SCSI LUN capacity request command) and ends by LUN disconnect request received from the same session.
- the session manager 32 holds all the session's private data as, for example, source session address, session counters, session status, all instances for the buffers in use, etc.
- the session manager transfers all requests to a dispatcher 33 coupled to the session manager.
- the dispatcher 33 is coupled to a data block manager 34 , buffer manager 35 and compression/decompression block 36 .
- the dispatcher 33 requests the data block manger 34 for data related transactions (e.g. Read, Write, etc.) and the compression/decompression block 36 for compression/decompression operations in accordance with certain embodiments of the present invention.
- compression algorithms have several compression levels characterized by trade-off between compression efficiency and performance parameters.
- the compression block 36 may select the optimal compression level and adjust the compression ratio to number of sockets currently handling by input/output block 31 (and/or CPU utilization). The information on the selected compression level is kept in the compression portion of data.
- the data block manager 34 is responsible for the order and memory sharing by the blocks of data.
- the compression/decompression block 36 is capable of reading and decompressing the buffer as well as of compressing and writing the data.
- the compression block is also configured to estimate the VLU size in accordance with LU size and expected compression rate (or predefined LU/VLU ratio) and report VLU size and free capacity in reply to Capacity status request.
- the buffer manager 35 manages memory buffer recourses and is responsible for allocating and releasing memory buffer to any block operation.
- the compression system further comprises an integrity manager 37 coupled to the session manager, the buffer manager and the data block manager.
- the integrity manager is responsible for synchronization and general control of all processes in the compression system.
- FIG. 4 illustrates a schematic diagram of raw and compressed data blocks in accordance with certain embodiments of the present invention.
- the virtual logical unit (VLU) 41 is segmented into virtual storage portions 43 with substantially equal predefined size (hereinafter referred to as virtual storage clusters or clusters).
- These virtual storage clusters serve as atomic elements of compression/decompression operations during input/output transactions (data access-related requests) on the data blocks.
- the size of the virtual storage clusters may be configurable; larger clusters provide lower processing overhead and higher compression ratio, while smaller clusters provide more efficient access but higher processing overhead.
- the size of cluster depends on available memory and required performance, as compression/decompression process of each I/O transaction requires at least one cluster available in the memory while performance defines a number of simultaneous transactions.
- the number of clusters is equal to the integer of (size of the VLU divided by the size of cluster) and plus one if there is a remainder.
- the size of cluster may vary in accordance with predefined criteria depending, for example, on type of data (e.g. text, image, voice, combined, etc.), application assigned to the LUN, etc.
- Each virtual storage cluster 43 corresponds to respective compressed section 46 within the logical unit (e.g. 46 A- 46 C as illustrated in FIG. 4 ), storing the corresponding data compressed by the compression system 20 .
- the clusters with the same size may naturally result in compressed sections with different size, depending on the nature of data in each cluster and compression algorithms. If an obtainable ratio of a cluster compression is less than a pre-defined value, the corresponding compressed section of the LU may comprise uncompressed data corresponding to this cluster. For instance, if the raw data in a given cluster is compressed to no less than X % (say 95%) of the original cluster size, then due to the negligible compression ratio, the corresponding section would accommodate the raw cluster data instead of the compressed data.
- the compression process may include adaptive capabilities, providing optimal compression algorithm for each data block in accordance with its content (e.g. different compression algorithms best suited for clusters with dominating voice, text, image, etc. data)
- each logical unit 44 comprises a header 45 , several compressed sections 46 , a section table 47 and a free space 48 .
- the header 45 comprises unique descriptor containing a logical unit number (LUN), the size of the virtual logical unit (VLU) and a signature indicating whether at least part of the storing data were processed by the compression system 20 .
- the header has a fixed length (e.g., by way of non-limiting example, 24 bytes including 4 bytes for the signature, 16 bytes for the unique descriptor and 4 byte for the info about size of the corresponding virtual logical unit).
- the number of compressed sections within the LU is equal to the number of virtual storage clusters.
- the data in the compressed sections 46 are stored in compression logical units (CLU) 48 all having equal predefined size (e.g., as illustrated in FIG. 4 , compression logical units 48 A 0 - 48 A 2 correspond to the compressed section 46 A which corresponds to the virtual storage cluster 43 A).
- CLU compression logical units
- the predefined CLU size is configurable; larger CLUs provide lower overhead, while smaller CLUs lead to higher resolution. Also, in certain embodiments of the invention, the CLU size may be adjusted to the maximum and/or optimal size of data blocks.
- the number of CLUs within a compressed section is equal to the integer of (size of the compressed section divided by the size of CLU) and plus one if there is a remainder.
- the last CLU in compressed section may be partly full (as, e.g. 48 -A 2 , 48 -C 1 in FIG. 4 ). Such CLUs may be handled in the same manner as full CLUs.
- CLU may be considered as a virtual portion of the compressed storage formed by a virtual sequence of segments in the memory (physical storage medium). The relationship between CLUs and assigned memory segments is further described with reference to FIG. 11 below.
- the section table 47 comprises records of all compressed sections 46 and specifies where to find CLUs corresponding to each of compressed sections.
- the record in respect of each of compressed sections (hereinafter section record) comprises a signature indicating if the section was compressed, overall size of the compressed section and a list of pointers pertaining to all CLUs contained in the section.
- the record may comprise indication of compression algorithm used during compression of the corresponding cluster and size of cluster (if variable per predefined criteria).
- the length of the section table has a fixed length proportional to a number of compressed sections and, accordingly, to a predefined number of virtual storage clusters.
- FIG. 5 illustrates, by way of non-limiting example, exemplary records in the section table in respect of an exemplary data block 50 .
- a record 51 of a compressed section comprises a signature 52 , size of the section 53 and several entries 54 .
- Each entry 54 of the section record comprises information about one of CLUs contained in the compressed section.
- the section table comprises relationship between the physical location and the logical CLU #.
- the exemplary raw data block 50 (referred to also in further examples) has original size 3 MB+413 bit.
- the predefined cluster size is 1M and CLU size is 60K. Accordingly, the data block will require 4 virtual storage clusters (3 clusters of 1 MB and one which is partly full, but handled as complete cluster).
- the clusters for virtual storage (accommodation) of the exemplary data block 50 correspond to compressed sections with respective sizes of, e.g., 301123, 432111, 120423 and 10342 bytes.
- CLU length of 60K means 61440 bytes
- the section #0 has 5 allocated CLUs ([301123/61440]+1);
- section #1 has 8 allocated CLUs ([432111/61440]+1);
- section #2 has 2 allocated CLUs ([120423/61440]+1) and section #3 has 1 allocated CLU ([10342/61440]+1).
- the compressed data block will comprise 16 CLUs (with total size 15*61440 bytes+10342 bytes).
- the CLUs will have sequential allocation of physical locations, for example,
- the distribution of CLUs corresponding to the data block may be changed after an update (in the current example the updates had no impact on the size of the compressed sections). For example,
- the virtual (logical) sequence of CLUs is the same as physical sequence of a storage media segments corresponding to the CLUs.
- virtual (logical) sequence of CLUs may differ from the physical sequence of disk segments corresponding to the CLUs. For instance in the example above, the second CLU of the first cluster was initially located at a physical segment #2 wherein after the update it is located at the physical segment #4.
- Each CLU is assigned to a segment in a memory, the correspondent segment is written in the offset of the header 45 length plus CLU's length multiplied by the segment serial number.
- the second CLU of the first cluster when the second CLU of the first cluster is located at the physical segment #2, it is written in the storage location memory in the offset 24 bytes of the header plus 2*61440 bytes.
- this CLU When after an update this CLU is located at the physical segment #4, its offset becomes 24 bytes of the header plus 4*61440 bytes.
- the number of entries in each section record is constant and corresponds to the maximal number of CLUs which may be required for storing the cluster. Accordingly, the size of each section record is constant regardless of the actual number of CLUs comprised in the section; not in use entries may have special marks.
- the number of entries in the section records is equal to integer of size of cluster divided by the size of CLU plus one.
- the size of the section table is equal to the size of section record multiplied by the predefined number of clusters in the VLU.
- each record of compressed section has 17 entries (integer of 1 MB/60K plus one) each one having 4 bytes.
- the illustrated section record 51 of the compressed section #0 has 5 entries containing information about physical location of the correspondent CLUs and 12 empty entries (marked, e.g. as ⁇ 1).
- the size of section record is 72 bytes (4 bytes for info on the compressed section size and signature plus 17 entries*4 bytes).
- the overall size of the section table is 288 bytes (4 compressed sections*72 bytes for each section record).
- FIGS. 6-11 illustrate input/output operations performed on a compressed data in accordance with certain embodiments of the present invention. Note that in accordance with certain embodiments of the present invention, the compression system 20 intervenes also in commands referring to the size of available storage (estimated storage space for raw data), keeping the size of VLU in the header of correspondent LU and providing said data upon request.
- FIG. 6 there is illustrated a generalized flowchart of compressed data block creation in accordance with certain embodiments of the present invention.
- the compression system 20 Upon request 60 to store a block of data, the compression system 20 virtually creates 61 the Virtual Logical Unit as described with reference to FIGS. 2 a - 2 c or refers to a VLU created when storing a previous data block(s).
- the compression system processes the first fixed-size portion (cluster) of the raw data into compressed section having size X. (The compression may be provided with a help of any appropriate commercial or specialized algorithm).
- the compression system defines first free storage location for the first CLU, starts and handles continuous writing 63 of the compressed section in this and sequential CLUs for storing at the storage device, and prepares 64 the pointers of the CLUs occupied during the process to be recorded in the section table.
- the compression system repeats 65 the process for next clusters until the data of the entire data block are written in the compressed form and the section table is created 66 .
- FIG. 7 there is illustrated a generalized flowchart of read operation on a compressed data block in accordance with certain embodiments of the present invention.
- the read operation starts read request 70 identifying the offset of data in the VLU and the range Y of data to read. It should be reminded that as was described with reference to FIGS. 2 a )- 2 c ), the computer's operating system (OS) will relate on the VLU as a virtual representation of raw data storage, the compression system will compress the corresponding data to the LU of the storage device and facilitate mapping between the compressed data and their virtual representation at the VLU.
- OS operating system
- the compression system 20 calculates 71 the serial number of the 1 st virtual storage cluster to be read (hereinafter the starting cluster) as integer of (offset divided by size of the cluster) and plus one if there is a remainder.
- the number of clusters to be read is defined by integer of (range of data to be read divided by size of the cluster) plus one.
- the compression system defines the compressed section(s) with one-to-one correspondence to the clusters to be read and points to the CLUs corresponding to the compressed section(s) to be decompressed and read.
- all the range of the data to be read may be entirely decompressed.
- the decompression may be provided in steps, and for read operation the compression system may maintain a buffer substantially equal to the size of cluster.
- the first read request comprises pointers to CLUs contained in the compresses section of the starting cluster.
- the entire compressed section corresponding to the starting cluster is read and uncompressed 72 by the compression system to the target buffer.
- the compression system calculates 73 the required offset within the cluster and copies the required data 74 to be passed to the application.
- the required length of copying data is calculated as follows:
- request is to read data of 20 bytes length from the offset 1 MB+1340. Reading will start from the second cluster and, accordingly, the required data are contained in compressed data block starting from 2 nd compressed section.
- the record of the 2 nd compressed section in the section table contains CLUs with pointers 2 , 3 , 7 , 10 , 11 , 12 , 15 , 14 . Accordingly, these CLUs will be read to a temporary buffer in the compression system 20 and uncompressed to 1 MB buffer (e.g. in the compression system). Then 20 bytes from the buffer offset 1340 will be moved to the target (user's) buffer.
- the required length of copying data is 20 bytes (equal to minimum between 20 bytes and (1 MB-1340 bytes)). If the other request were to read data of 2 MB length from the same offset, the operation would be repeated in a similar manner to 3 rd and 4 th compressed sections; and the required length of data copying from the starting cluster is 1 MB-1340 bytes (equal to minimum between 2 MB and (1 MB-1340 bytes)).
- a “write” request 80 identifies the offset in VLU and the range Y of data to write.
- the compression system 20 calculates 81 the serial number of the 1 st virtual storage cluster to be updated (overwrite) as integer of (offset divided by size of the cluster) and plus one if there is a remainder.
- the number of virtual storage clusters to overwrite is defined by integer of (range of data to write divided by size of the cluster) and plus one if there is a remainder.
- the compression system defines the compressed section(s) to overwrite and generates read request in a manner similar to that described with reference to FIG. 7 .
- the compression system calculates 83 the required offset within the cluster as described with reference to FIG. 7 and updates (overwrites) the required data range 84 . Then, the compression system compresses 85 the updated cluster, updates the section table and requests to write 86 the new compressed section to the compressed data block. If the data range Y exceeds the cluster size, the operation is repeated 87 for successive clusters. Upon the end of the process, the compression system updates the section table 88 .
- the storage location of required data may be accessed directly and, accordingly, read/update (and similar) operations require restoring merely the virtual clusters containing the required data range and not the entire data blocks.
- FIGS. 9 and 10 illustrate fragmentation handling algorithms of CLU management in accordance with certain embodiments of the present invention.
- FIG. 9 illustrates an algorithm of CLU management during write/update operation on a compressed section (step 86 in FIG. 8 ) in accordance with certain embodiments of the present invention.
- the compression system Before writing the updated compressed section, the compression system compares 91 the number of CLUs required for the updated and old compressed sections. If the number of CLUs is unchanged, the compression system 20 requests to write the updated compressed section sequentially to all CLUs 92 corresponding to the old compressed section.
- the compressed section will be written sequentially on a part of CLUs corresponding to the old compression section.
- the information about released CLUs is updated 93 in a special list (queue) of free CLUs handled by compression system 20 until the LU is disconnected. If the new number of the required CLUs is more than the old number, the compressed section will be written sequentially on all CLUs corresponding to the old compression section 94 and then on CLUs taken from the free CLUs queue 95 .
- the compression system will define the last CLU allocated to the data block (#n) and request to write sequentially on CLUs starting with number (n+1) ( 96 ); the list of allocated CLUs will be accordingly updated 97 .
- FIG. 10 illustrates an algorithm of CLU management during disconnecting from a storage logical unit.
- the compression system Before disconnecting 102 from LU, the compression system checks 101 if the list of free CLUs is empty. If the list still comprises CLUs, the compression system 20 defines a CLU with the highest storage location pointer among CLUs in-use. Compressed data contained in said CLU are transferred 103 to a free CLU with a lower pointer and the emptied CLU is added to the list of free CLUs. The process is repeated 104 until all the pointers of CLUs in-use are lower than the pointer of any CLU comprising in the list of free CLUs. The section table will be accordingly updated 105 . Such updates may occur per each of said CLU re-writing, after the end of entire re-writing process or in accordance with other predefined criteria.
- the LU is disconnected and free CLUs are released 106 .
- the selection of free CLU for above process may be provided in accordance with different algorithms.
- said compressed data from the CLU with the highest storage location pointer may be transferred to the free CLU with the lowest storage location pointer.
- FIGS. 11 a - 11 c there are illustrated relationship between CLUs and assigned disk memory segments in accordance with certain embodiments of the present invention.
- FIG. 11 a illustrates exemplary data block 50 illustrated in FIG. 5 when created as new compressed data block.
- the virtual (logical) sequence of CLUs is the same as physical sequence of disk segments corresponding to the CLUs (numbers within CLUs are illustrating pointers to the respective disk memory segments).
- FIG. 11 b illustrates the new distribution of CLUs within the updated compressed data block with unchanged size of the compressed sections as in the updated exemplary data block described with reference to FIG. 5 .
- FIG. 11 c illustrates the de-fragmented distribution of CLUs within updated exemplary compressed data block 50 , wherein the size of 2 nd compressed section has been changed after an update from 432111 to 200100 bytes. If, for example, the update offset is 1 MB+314 bytes, the first compressed section is unaffected during the update. The new size of 2 nd compressed section requires allocation of only 4 CLUs ([200100/61440]+1). Note, as shown in FIG. 11B , that before the update the second compressed section accommodated 8 CLUs (Nos. 2, 3, 7, 10, 11, 12, 15 and 16).
- the compression system 20 will write the updated 2 nd compressed section on first 4 CLUs from the compressed section ( 2 , 3 , 7 , 10 in the present example) and send CLUs with pointers 11 , 12 , 15 and 16 to the list of free CLUs. 3 rd and 4 th compressed sections are also unaffected during this particular update.
- the compression system 20 before disconnecting from LU will check if the list of free CLUs is empty. By this example the list contains CLUs with storage location pointers 11 , 12 , 15 and 16 . As described with reference to FIG.
- the compression system will re-write compressed data from CLU with pointer 13 to CLU with pointer 11 ; compressed data from CLU with pointer 16 to CLU with pointer 12 and release CLUs with pointers 13 - 16 .
- the updated data block has 12 allocated CLUs with no de-fragmentation.
- Additional requirements may lead to more complicated communication between the compression system and the computer.
Abstract
Description
- The present application is a Continuation of prior U.S. application Ser. No. 11/258,379, filed Oct. 26, 2005, the entirety of which is hereby incorporated by reference, which is a Continuation-in-Part of prior International Application No. PCT/IL2005/000419, filed Apr. 21, 2005, the entirety of which is hereby incorporated by reference.
- This invention relates to computing systems and, in particular, to a method and apparatus facilitating compression and operation on compressed data over block storage protocols.
- In current business environment, all types of business data are becoming more and more critical to business success. The tremendous growth and complexity of business-generated data is driving the demand for information storage, defining the way of sharing, managing and protection of information assets.
- Typically, no single technology or architecture is able to address all needs of any organization. Main storage technologies are described, for example, in the White Paper by EMC, “Leveraging Networked storage for your business”, March 2003, USA and basically can be identified by location and connection type (intra-computer storage, direct attached storage (DAS), IP, channel networks, etc.) and by the method that data is accessed. There are three basic types of storage architectures to consider in connection with methods of data access: Block Access, File Access, and Object Access.
- In block mode access architecture, the communication between a server/client and a storage medium occurs in terms of blocks; information is pulled block by block directly from the disk. The operation system keeps track of where each piece of information is on the disk, while the storage medium is usually not aware of the file system used to organize the data on the device. When something needs to get read or be written, the data are directly accessed from the disk by that processor which knows where each block of data is located on the disk and how to put them together. Examples of block mode access storage technologies are DAS (Direct Attached Storage), SAN (Storage Area Network), Block Storage over IP (e.g. FCIP, iFCP, iSCSI, etc.), intra-memory storage, etc.
- File access requires the server or client to request a file by name, not by physical location. As a result, a storage medium (external storage device or storage unit within computer) is usually responsible to map files back to blocks of data for creating, maintaining and updating the file system, while the block access is handled “behind the scene”. The examples of file access storage technologies are NAS (Network Attached Storage with NFS, CIFS, HTTP, etc. protocols), MPFS (Multi-Pass File Serving), intra-computer file storage, etc. The file access storage may be implemented, for example, for general purpose files, web applications, engineering applications (e.g. CAD, CAM, software development, etc.), imaging and 3D data processing, multi-media streaming, etc.
- Object access further simplifies data access by hiding all the details about block, file and storage topology from the application. The object access occurs over API integrated in content management application. The example of object access storage technology is CAS (Content Addressed Storage).
- More efficient use of storage may be achieved by data compression before it is stored. Data compression techniques are used to reduce the amount of data to be stored or transmitted in order to reduce the storage capacity and transmission time respectively. Compression may be achieved by using different compression algorithms, for instance, a standard compression algorithm, such as that described by J. Ziv and A. Lempel, “A Universal Algorithm For Sequential Data Compression,” IEEE Transactions on Information Theory, IT-23, pp. 337-343 (1997). It is important to perform compression transparently, meaning that the data can be used with no changes to existing applications. In either case, it is necessary to provide a corresponding decompression technique to enable the original data to be reconstructed and accessible to applications. When an update is made to a compressed data, it is generally not efficient to decompress and recompress the entire block or file, particularly when the update is to a relatively small part of data.
- Various implementations of optimization of storage and access to the stored data are disclosed for example in the following patent publications:
- U.S. Pat. No. 5,761,536 (Franaszek) discloses a system and method for storing variable length objects such that memory fragmentation is reduced, while avoiding the need for memory reorganization. A remainder of a variable length object may be assigned to share a fixed-size block of storage with a remainder from another variable length object (two such remainders which share a block are referred to as roommates) on a best fit or first fit basis. One remainder is stored at one end of the block, while the other remainder is stored at the other end of the block. The variable length objects which are to share a block of storage are selected from the same cohort. Thus, there is some association between the objects. This association may be that the objects are from the same page or are in some linear order spanning multiple pages, as examples. Information regarding the variable length objects of a cohort, such as whether an object has a roommate, is stored in memory.
- U.S. Pat. No. 5,813,011 (Yoshida et al.) discloses a method and apparatus for storing compressed data, wherein compressed file consists of: a header that carries information showing the position of a compression management table; compressed codes; and the compression management table that holds information showing the storage location of the compressed code of each original record.
- U.S. Pat. No. 5,813,017 (Morris et al.) discloses a method and means for reducing the storage requirement in the backup subsystem and further reducing the load on the transmission bandwidth where base files are maintained on the server in a segmented compressed format. When a file is modified on the client, the file is transmitted to the server and compared with the segmented compressed base version of the file utilizing a differencing function but without decompressing the entire base file. A delta file which is the difference between the compressed base file and the modified version of the file is created and stored on a storage medium which is part of the backup subsystem.
- U.S. Pat. No. 6,092,071 (Bolan et al.) discloses a system for control of compression and decompression of data based upon system aging parameters, such that compressed data becomes a system managed resource with a distinct place in the system storage hierarchy. Processor registers are backed by cache, which is backed by main storage, which is backed by decompressed disk storage, which is backed by compressed disk storage then tape, and so forth. Data is moved from decompressed to compressed form and migrated through the storage hierarchy under system control according to a data life cycle based on system aging parameters or, optionally, on demand: data is initially created and stored; the data is compressed at a later time under system control; when the data is accessed, it is decompressed on demand by segment; at some later time, the data is again compressed under system control until next reference. Large data objects are segmented and compression is applied to more infrequently used data.
- U.S. Pat. No. 6,115,787 (Obara et al.) discloses a disk storage system, wherein data to be stored in the cache memory is divided into plural data blocks, each having two cache blocks in association with track blocks to which the data belongs and are compressed, thus providing the storage of plural compressed records into a cache memory of a disk storage system in an easy-to-read manner. The respective data blocks after the compression are stored in one or plural cache blocks. Information for retrieving each cache block from an in-track address for the data block is stored as part of retrieval information for the cache memory. When the respective data blocks in a record are read, the cache block storing the compressed data block is determined based on the in-track address of the data block and the retrieval information.
- U.S. Pat. No. 6,349,375 (Faulkner et al.) discloses a combination of data compression and decompression with a virtual memory system. A number of computer systems are discussed, including so-called embedded systems, in which data is stored in a storage device in a compressed format. In response to a request for data by a central processing unit (CPU), the virtual memory system will first determine if the requested data is present in the portion of main memory that is accessible to the CPU, which also happens to be where decompressed data is stored. If the requested data is not present in the decompressed portion of main memory, but rather is present in a compressed format in the storage device, the data will be transferred into the decompressed portion of main memory through a demand paging operation. During the demand paging operation, the compressed data will be decompressed. Likewise, if data is paged out of the decompressed portion of main memory, and that data must be saved, it can also be compressed before storage in the storage device for compressed data.
- U.S. Pat. No. 6,532,121 (Rust et al.) discloses a compression system storing meta-data in the compressed record to allow better access and manage merging data. Markers are added to the compression stream to indicate various things. Each compressed record has a marker to indicate the start of the compressed data. These markers have sector number as well as the relocation block numbers embedded in their data. A second marker is used to indicate free space. When compressed data is stored on the disk drive, free space is reversed so that future compression of the same, or modified, data has the ability to expand slightly without causing the data to be written to a different location. Also the compressed data can shrink and the remaining space can be filled in with this free space marker. A third type of marker is the format pattern marker. Compression algorithms generally compress the format pattern very tightly. However, the expectation is that the host will write useful data to the storage device. The compressor is fed typical data in the region of the format pattern, but a marker is set in front of this data to allow the format pattern to be returned rather than the typical data.
- U.S. Pat. No. 6,584,520 (Cowart et al.) discloses a method of storage and retrieval of compressed files. The method involves dynamically generating file allocation table to retrieve compressed file directly from compact disk read only memory.
- U.S. Pat. No. 6,678,828 (Pham et al.) discloses a secure network file access appliance supporting the secure access and transfer of data between the file system of a client computer system and a network data store. An agent provided on the client computer system and monitored by the secure network file access appliance ensures authentication of the client computer system with respect to file system requests issued to the network data store. The secure network file access appliance is provided in the network infrastructure between the client computer system and network data store to apply qualifying access policies and selectively pass through to file system requests. The secure network file access appliance maintains an encryption key store and associates encryption keys with corresponding file system files to encrypt and decrypt file data as transferred to and read from the network data store through the secure network file access appliance.
- U.S. Patent Application No. 2004/030,813 (Benveniste et al.) discloses a method and system of storing information, includes storing main memory compressed information onto a memory compressed disk, where pages are stored and retrieved individually, without decompressing the main memory compressed information.
- U.S. Patent Application No. 2005/021,657 (Negishi et al.) discloses a front-end server for temporarily holding an operation request for a NAS server, which is sent from a predetermined client, is interposed between the NAS server and clients on a network. This front-end server holds information concerning a correlation among data files stored in the NAS server, optimizes the operation request received from the client based on the information, and transmits the operation request to the NAS server.
- There is a need in the art to provide for a new system and method of compressed storage for use with block mode access storage with no derogating of storing and retrieving capabilities and with no need of a user's and/or application's awareness of compression/decompression operations as well as the storage location of the compressed data.
- In accordance with certain aspects of the present invention, there is provided a compression system and method of operation thereof for use in a storage network comprising a plurality of network elements and operable with a block mode access storage protocol (e.g. SCSI, Fiber Channel, FCIP, iFCP, iSCSI, etc.). The compression system is operatively coupled to at least one computer and to one or more storage devices configured as at least one storage logical unit accommodating data compressed by the compression system, while the computer, the storage devices and the compression system are configured as separate network elements.
- In accordance with certain aspects of the present invention, the method of operating such compression system comprises:
-
- configuring the compression system to hold a virtual logical unit, said virtual logical unit configured to virtually represent in non-compressed form the compressed data stored in said at least one storage logical unit, wherein a size of the virtual logical unit corresponds to an estimated size of raw data which, being compressed, would substantially amount to a size of said storage logical unit;
- intercepting one or more data access-related requests from said at least one computer addressed to said storage logical unit,
- addressing said requests to the virtual logical unit;
- facilitating mapping between the compressed data and their virtual representation at the virtual logical unit.
- In accordance with further aspects of the present invention, the method further comprises reporting the size and free capacity of the virtual logical unit in reply to a capacity status request from the computer to the storage logical unit. Accordingly, the method further comprises generating a header of the storage logical unit, said header holding information related to the size of the virtual logical unit.
- In accordance with other aspects of the present invention, the compression system comprises means for compressing raw data to be stored in said at least one storage logical unit; means for creating and holding a virtual logical unit, said virtual logical unit configured to virtually represent in non-compressed form the data stored in the storage logical unit, wherein a size of the virtual logical unit corresponds to an estimated size of raw data which, being compressed, would substantially amount to a size of the storage logical unit; means for intercepting data access-related requests from said at least one computer addressed to the storage logical unit and addressing said request to the virtual logical unit; and means for facilitating mapping between the compressed data and their virtual accommodation at the virtual logical unit.
- In accordance with further aspects of the present invention, the compression system may be coupled to the storage logical unit in a serial manner, and be configured to act as a transparent bridge in respect to the stored data.
- In accordance with further aspects of the present invention, the compression system is further configured to report the size and free capacity of the virtual logical unit in reply to a capacity status request from the computer to the storage logical unit.
- In accordance with further aspects of the present invention, at least part of the compression system may be integrated with a communication device capable to be configured as a network element of the storage network.
- It is to be understood that the system according to the invention may be a suitably programmed computer. Likewise, the invention contemplates a computer program being readable by a computer for executing the method of the invention. The invention further contemplates a machine-readable memory, tangibly embodying a program of instructions executable by the machine for executing the method of the invention.
- In order to understand the invention and to see how it may be carried out in practice, a preferred embodiment will now be described, by way of non-limiting example only, with reference to the accompanying drawings, in which:
-
FIGS. 1 a), 1 b) 1 c) are schematic block diagrams of typical block mode access storage architectures as known in the art. -
FIGS. 2 a), 2 b) and 2 c) are schematic block diagrams of storage architectures in accordance with certain embodiments of the present invention. -
FIG. 3 is a schematic block diagram of the system functional architecture in accordance with certain embodiments of the present invention. -
FIG. 4 is a schematic diagram of virtual logical unit and logical unit in accordance with certain embodiments of the present invention. -
FIG. 5 is an exemplary structure of section table in accordance with certain embodiments of the present invention. -
FIG. 6 is a generalized flowchart of operation of compressed data block creation in accordance with certain embodiments of the present invention. -
FIG. 7 is a generalized flowchart of read operation on a compressed data block in accordance with certain embodiments of the present invention. -
FIG. 8 is a generalized flowchart of write operation on a compressed data block in accordance with certain embodiments of the present invention. -
FIG. 9 is a generalized flowchart illustrating sequence of write operation on a compressed section in accordance with certain embodiments of the present invention. -
FIG. 10 is a generalized flowchart of CLU management in accordance with certain embodiments of the present invention during disconnecting from a storage logical unit. -
FIGS. 11 a-11 c are schematic illustrations of relationship between CLUs and assigned disk memory segments in accordance with certain embodiments of the present invention. - In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention. In the drawings and descriptions, identical reference numerals indicate those components that are common to different embodiments or configurations.
- Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions, utilizing terms such as, “processing”, “computing”, “calculating”, “determining”, or the like, refer to the action and/or processes of a computer or computing system, or processor or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data, similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices.
- Embodiments of the present invention may use terms such as processor, computer, apparatus, system, sub-system, module, unit, device (in single or plural form) for performing the operations herein. This may be specially constructed for the desired purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium such as, but not limited to, any type of disk including, optical disks, CD-ROMs, magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), electrically programmable read-only memories (EPROMs), electrically erasable and programmable read only memories (EEPROMs), magnetic or optical cards, or any other type of media suitable for storing electronic instructions, and capable of being coupled to a computer system bus.
- The processes/devices (or counterpart terms specified above) and displays presented herein are not inherently related to any particular computer or other apparatus, unless specifically stated otherwise. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the desired method. The desired structure for a variety of these systems will appear in the description below. In addition, embodiments of the present invention are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the inventions as described herein.
- Bearing this in mind, attention is drawn to
FIG. 1 a-1 c illustrating block diagrams of typical block mode access storage architectures as known in the art. -
FIG. 1 a illustrates typical DAS (Direct Attached Storage) architecture wherein astorage device 12 is directly connected to acomputer 11 by connectivity media via block mode access storage protocols (e.g. SCSI, Fiber Channel, etc.). This direct connection provides fast access to the data; however, storage is only accessible from that server. DAS includes, for example, the internally attached local disk drives or externally attached RAID (redundant array of independent disks) or JBOD (just a bunch of disks). -
FIG. 1 b illustrates typical architecture of Storage Area Network (SAN) providing access to storage subsystems using block mode access storage protocols. The storage subsystems include host computer(s) 11 (typically with host bus adapters (HBAs)), FC network (SAN) 13 for routing the storage traffic and storage device(s) 12. The storage subsystems are generally available to multiple hosts at the same time. -
FIG. 1 c illustrates typical architecture of storage network based on iSCSI protocol which enables transport of block data between computer(s) 11 and the storage device(s) 12 overIP network 14 without the need for a specialized network infrastructure, such as, for example, Fiber Channel. - Referring to
FIGS. 2 a-2 c, there are illustrated, by way of non-limiting examples, schematic diagrams of storage architecture in accordance with certain embodiments of the present invention.FIG. 2 a illustrates certain embodiments of the present invention for DAS storage architecture illustrated inFIG. 1 a;FIG. 2 b illustrates certain embodiments of the present invention for SAN storage architecture illustrated inFIG. 1 b andFIG. 2 c illustrates certain embodiments of the present invention for iSCSI storage architecture illustrated inFIG. 1 c.A compression system 20 is coupled to the computer(s) 11 (e.g. directly to the computer or the respective LAN, indirectly viastorage network 13,IP network 14, etc.) via interface 21 and to the storage device(s) via interface 22. Thecompression system 20 acts as a bridge between the computer(s) and the storage device(s). Theplatform 20 may support any physical interfaces (e.g. Ethernet, Fiber Channel, etc.) and may be configured to preserve the storage device features such as, for example, redundancy, mirroring, snapshots, failover, rollback, management, etc. The platform may be configured for seamless integration with existing network infrastructure. A user need not be aware of the compression and decompression operations and the storage location of compressed data. - The compression system is configured to intercept communication between the computer(s) and the storage device(s), and to derive and compress data blocks corresponding to the data access-related request.
- During “write” operation on the data blocks to be compressed before storage, the data blocks from the computer intercepted by the
compression system 20, compressed and moved to thestorage device 12. Data blocks containing different kinds of data (e.g. text, image, voice, etc.) may be compressed by different compression algorithms. A “read” operation proceeds in reverse direction; the required data blocks are retrieved by the compression system, decompressed (partly or entirely, in accordance with required data range) and sent to the appropriate API. - The
compression system 20 is configured to transfer selected control-related requests (e.g. format disk, de-fragment disk, take a snapshot, etc.) between the computer and the storage device in a transparent manner, while intervening in data access-related transactions (e.g. read, write, etc.) and some control related transactions (e.g. capacity status, etc.) - In certain embodiments of the invention the
compression system 20 may also be configured to compress only selected passing blocks of data in accordance with pre-defined criteria (e.g. LUN number, size, IP address, type of data, etc.). - The raw data (or their relevant part) are compressed by the
compression system 20 during or before writing to thestorage device 12. Similarly, the compressed data (or their relevant part) are decompressed by thecompression system 20 during or after reading from thestorage device 12. - As known in the art, the typical storage systems and networks are able to recognize the divided organization of storage. A storage disk or a set of disks may be conceptually divided in logical unit(s). Logical units (LU) can directly correspond to a volume drive, to a host application, storage device, etc. and constitute a logical representation of physical storage. Each logical unit has an address, known as the logical unit number (LUN), which allows it to be uniquely identified. Users can determine whether a LUN is a disk drive, a number of disk drives, a partition on a disk drive, etc.
- In accordance with certain embodiments of the present invention, the
compression system 20 is configured to create in respect to at least one logical unit (LU) a corresponding virtual logical unit (VLU) with a size larger than the size of LU. A ratio between the size of LU and VLU is defined in accordance with expected compression rate; accordingly, the size of the VLU corresponds to the estimated size of raw data which, being compressed, would substantially amount to the LU size. (For example, in certain embodiments of the present invention, a typical ratio between size of VLU and LU is estimated as 3 for e-mails, as 8 for a database data, etc.) When intercepting the communication between the computer and the storage device, the compression system addresses data access-related requests from the computer to the VLU instead the LU and the VLU provides virtual accommodation of raw data. Thus, in accordance with certain aspects of the present invention, the computer's operating system (OS) will relate on the VLU as a virtual representation of raw data storage, the compression system will compress the corresponding data to the LU of the storage device and facilitate mapping between the compressed data and their virtual representation at the VLU. The operations on the compressed data in accordance with certain embodiments of the present invention will be further described with reference toFIGS. 3-9 below. - Note that the invention is not bound by the specific architecture described with reference to
FIGS. 1 and 2 . Those versed in the art will readily appreciate that the invention is, likewise, applicable to any computing systems and any storage network architecture comprising block storage protocols (e.g. SCSI, Fiber Channel, iSCSI, etc.). The functions of the compression system 20 (or part of them) may be implemented in a stand-alone server(s) (as illustrated inFIGS. 2 a-2 c), distributed between several platforms or integrated within other storage network elements (e.g. file servers, enterprise switches, etc.). -
FIG. 3 illustrates a schematic functional block diagram of thecompression system 20 in accordance with certain embodiments of the present invention. - The compression system comprises an Input/Output (I/O) block 31 coupled to a
session manager 32. The I/O block gets data access-related requests (e.g. read, write, etc.) and forwards them to the session manager. - A session starts by LUN capacity request (e.g. SCSI LUN capacity request command) and ends by LUN disconnect request received from the same session. The
session manager 32 holds all the session's private data as, for example, source session address, session counters, session status, all instances for the buffers in use, etc. The session manager transfers all requests to adispatcher 33 coupled to the session manager. Thedispatcher 33 is coupled to adata block manager 34,buffer manager 35 and compression/decompression block 36. - The
dispatcher 33 requests thedata block manger 34 for data related transactions (e.g. Read, Write, etc.) and the compression/decompression block 36 for compression/decompression operations in accordance with certain embodiments of the present invention. Generally, compression algorithms have several compression levels characterized by trade-off between compression efficiency and performance parameters. Thecompression block 36 may select the optimal compression level and adjust the compression ratio to number of sockets currently handling by input/output block 31 (and/or CPU utilization). The information on the selected compression level is kept in the compression portion of data. The data blockmanager 34 is responsible for the order and memory sharing by the blocks of data. The compression/decompression block 36 is capable of reading and decompressing the buffer as well as of compressing and writing the data. The compression block is also configured to estimate the VLU size in accordance with LU size and expected compression rate (or predefined LU/VLU ratio) and report VLU size and free capacity in reply to Capacity status request. - The
buffer manager 35 manages memory buffer recourses and is responsible for allocating and releasing memory buffer to any block operation. - The compression system further comprises an
integrity manager 37 coupled to the session manager, the buffer manager and the data block manager. The integrity manager is responsible for synchronization and general control of all processes in the compression system. - Those skilled in the art will readily appreciate that the invention is not bound by the configuration of
FIG. 3 ; equivalent and/or modified functionality may be consolidated or divided in another manner. -
FIG. 4 illustrates a schematic diagram of raw and compressed data blocks in accordance with certain embodiments of the present invention. The virtual logical unit (VLU) 41 is segmented into virtual storage portions 43 with substantially equal predefined size (hereinafter referred to as virtual storage clusters or clusters). These virtual storage clusters serve as atomic elements of compression/decompression operations during input/output transactions (data access-related requests) on the data blocks. The size of the virtual storage clusters may be configurable; larger clusters provide lower processing overhead and higher compression ratio, while smaller clusters provide more efficient access but higher processing overhead. Also, the size of cluster depends on available memory and required performance, as compression/decompression process of each I/O transaction requires at least one cluster available in the memory while performance defines a number of simultaneous transactions. The number of clusters is equal to the integer of (size of the VLU divided by the size of cluster) and plus one if there is a remainder. - Alternatively, in certain other embodiments of the invention, the size of cluster may vary in accordance with predefined criteria depending, for example, on type of data (e.g. text, image, voice, combined, etc.), application assigned to the LUN, etc.
- Each virtual storage cluster 43 (e.g. 43A-43C as illustrated in
FIG. 4 ) corresponds to respectivecompressed section 46 within the logical unit (e.g. 46A-46C as illustrated inFIG. 4 ), storing the corresponding data compressed by thecompression system 20. The clusters with the same size may naturally result in compressed sections with different size, depending on the nature of data in each cluster and compression algorithms. If an obtainable ratio of a cluster compression is less than a pre-defined value, the corresponding compressed section of the LU may comprise uncompressed data corresponding to this cluster. For instance, if the raw data in a given cluster is compressed to no less than X % (say 95%) of the original cluster size, then due to the negligible compression ratio, the corresponding section would accommodate the raw cluster data instead of the compressed data. - In certain embodiments of the invention, the compression process may include adaptive capabilities, providing optimal compression algorithm for each data block in accordance with its content (e.g. different compression algorithms best suited for clusters with dominating voice, text, image, etc. data)
- In accordance with certain embodiments of the present invention each
logical unit 44 comprises aheader 45, severalcompressed sections 46, a section table 47 and afree space 48. Theheader 45 comprises unique descriptor containing a logical unit number (LUN), the size of the virtual logical unit (VLU) and a signature indicating whether at least part of the storing data were processed by thecompression system 20. The header has a fixed length (e.g., by way of non-limiting example, 24 bytes including 4 bytes for the signature, 16 bytes for the unique descriptor and 4 byte for the info about size of the corresponding virtual logical unit). - The number of compressed sections within the LU is equal to the number of virtual storage clusters. In accordance with certain embodiments of the present invention, the data in the
compressed sections 46 are stored in compression logical units (CLU) 48 all having equal predefined size (e.g., as illustrated inFIG. 4 , compression logical units 48A0-48A2 correspond to thecompressed section 46A which corresponds to thevirtual storage cluster 43A). The predefined CLU size is configurable; larger CLUs provide lower overhead, while smaller CLUs lead to higher resolution. Also, in certain embodiments of the invention, the CLU size may be adjusted to the maximum and/or optimal size of data blocks. - The number of CLUs within a compressed section is equal to the integer of (size of the compressed section divided by the size of CLU) and plus one if there is a remainder. The last CLU in compressed section may be partly full (as, e.g. 48-A2, 48-C1 in
FIG. 4 ). Such CLUs may be handled in the same manner as full CLUs. CLU may be considered as a virtual portion of the compressed storage formed by a virtual sequence of segments in the memory (physical storage medium). The relationship between CLUs and assigned memory segments is further described with reference toFIG. 11 below. - The section table 47 comprises records of all
compressed sections 46 and specifies where to find CLUs corresponding to each of compressed sections. The record in respect of each of compressed sections (hereinafter section record) comprises a signature indicating if the section was compressed, overall size of the compressed section and a list of pointers pertaining to all CLUs contained in the section. Optionally the record may comprise indication of compression algorithm used during compression of the corresponding cluster and size of cluster (if variable per predefined criteria). As will be further illustrated with reference toFIG. 5 , the length of the section table has a fixed length proportional to a number of compressed sections and, accordingly, to a predefined number of virtual storage clusters. -
FIG. 5 illustrates, by way of non-limiting example, exemplary records in the section table in respect of anexemplary data block 50. - A
record 51 of a compressed section comprises asignature 52, size of thesection 53 andseveral entries 54. Eachentry 54 of the section record comprises information about one of CLUs contained in the compressed section. The section table comprises relationship between the physical location and the logical CLU #. - The exemplary raw data block 50 (referred to also in further examples) has
original size 3 MB+413 bit. For the example purposes, the predefined cluster size is 1M and CLU size is 60K. Accordingly, the data block will require 4 virtual storage clusters (3 clusters of 1 MB and one which is partly full, but handled as complete cluster). - The clusters for virtual storage (accommodation) of the exemplary data block 50 correspond to compressed sections with respective sizes of, e.g., 301123, 432111, 120423 and 10342 bytes. As CLU length of 60K means 61440 bytes, the
section # 0 has 5 allocated CLUs ([301123/61440]+1);section # 1 has 8 allocated CLUs ([432111/61440]+1);section # 2 has 2 allocated CLUs ([120423/61440]+1) andsection # 3 has 1 allocated CLU ([10342/61440]+1). Totally, the compressed data block will comprise 16 CLUs (withtotal size 15*61440 bytes+10342 bytes). - If the exemplary data block 50 was stored for the first time, the CLUs will have sequential allocation of physical locations, for example,
-
- First 5 CLUs with
physical location pointers Section 0; - Next 8 CLUs with the
pointers Section 1; - Next 2 CLUs with the
pointers Section 2; - Next 1 CLUs with the
pointer 16 will be allocated toSection 3.
- First 5 CLUs with
- As will be further described with a reference to
FIGS. 8-11 below, the distribution of CLUs corresponding to the data block may be changed after an update (in the current example the updates had no impact on the size of the compressed sections). For example, -
- CLUs with the
pointers Section 0; - CLUs with the
pointers Section 1; - CLUs with the
pointers Section 2; - CLUs with the
pointer 16 will be allocated toSection 3.
- CLUs with the
- When the data block has been stored for the first time, the virtual (logical) sequence of CLUs is the same as physical sequence of a storage media segments corresponding to the CLUs. In an updated data block, virtual (logical) sequence of CLUs may differ from the physical sequence of disk segments corresponding to the CLUs. For instance in the example above, the second CLU of the first cluster was initially located at a
physical segment # 2 wherein after the update it is located at thephysical segment # 4. Each CLU is assigned to a segment in a memory, the correspondent segment is written in the offset of theheader 45 length plus CLU's length multiplied by the segment serial number. For example, in the exemplary data block above, when the second CLU of the first cluster is located at thephysical segment # 2, it is written in the storage location memory in the offset 24 bytes of the header plus 2*61440 bytes. When after an update this CLU is located at thephysical segment # 4, its offset becomes 24 bytes of the header plus 4*61440 bytes. - In certain embodiments of the invention, the number of entries in each section record is constant and corresponds to the maximal number of CLUs which may be required for storing the cluster. Accordingly, the size of each section record is constant regardless of the actual number of CLUs comprised in the section; not in use entries may have special marks. The number of entries in the section records is equal to integer of size of cluster divided by the size of CLU plus one. The size of the section table is equal to the size of section record multiplied by the predefined number of clusters in the VLU.
- In the illustrated example with clusters
predefined size 1 MB and CLU's predefined size 60 K, each record of compressed section has 17 entries (integer of 1 MB/60K plus one) each one having 4 bytes. Respectively, the illustratedsection record 51 of thecompressed section # 0 has 5 entries containing information about physical location of the correspondent CLUs and 12 empty entries (marked, e.g. as −1). The size of section record is 72 bytes (4 bytes for info on the compressed section size and signature plus 17 entries*4 bytes). The overall size of the section table is 288 bytes (4 compressed sections*72 bytes for each section record). -
FIGS. 6-11 illustrate input/output operations performed on a compressed data in accordance with certain embodiments of the present invention. Note that in accordance with certain embodiments of the present invention, thecompression system 20 intervenes also in commands referring to the size of available storage (estimated storage space for raw data), keeping the size of VLU in the header of correspondent LU and providing said data upon request. - Referring to
FIG. 6 , there is illustrated a generalized flowchart of compressed data block creation in accordance with certain embodiments of the present invention. Uponrequest 60 to store a block of data, thecompression system 20 virtually creates 61 the Virtual Logical Unit as described with reference toFIGS. 2 a-2 c or refers to a VLU created when storing a previous data block(s). At the next step 62 the compression system processes the first fixed-size portion (cluster) of the raw data into compressed section having size X. (The compression may be provided with a help of any appropriate commercial or specialized algorithm). The compression system defines first free storage location for the first CLU, starts and handles continuous writing 63 of the compressed section in this and sequential CLUs for storing at the storage device, and prepares 64 the pointers of the CLUs occupied during the process to be recorded in the section table. The compression system repeats 65 the process for next clusters until the data of the entire data block are written in the compressed form and the section table is created 66. - Referring to
FIG. 7 , there is illustrated a generalized flowchart of read operation on a compressed data block in accordance with certain embodiments of the present invention. - The read operation starts read
request 70 identifying the offset of data in the VLU and the range Y of data to read. It should be reminded that as was described with reference toFIGS. 2 a)-2 c), the computer's operating system (OS) will relate on the VLU as a virtual representation of raw data storage, the compression system will compress the corresponding data to the LU of the storage device and facilitate mapping between the compressed data and their virtual representation at the VLU. - The
compression system 20 calculates 71 the serial number of the 1st virtual storage cluster to be read (hereinafter the starting cluster) as integer of (offset divided by size of the cluster) and plus one if there is a remainder. The number of clusters to be read is defined by integer of (range of data to be read divided by size of the cluster) plus one. As a result, the compression system defines the compressed section(s) with one-to-one correspondence to the clusters to be read and points to the CLUs corresponding to the compressed section(s) to be decompressed and read. - In certain embodiments of the invention, all the range of the data to be read may be entirely decompressed. Alternatively, as illustrated in
FIG. 7 , the decompression may be provided in steps, and for read operation the compression system may maintain a buffer substantially equal to the size of cluster. The first read request comprises pointers to CLUs contained in the compresses section of the starting cluster. The entire compressed section corresponding to the starting cluster is read and uncompressed 72 by the compression system to the target buffer. At the next step the compression system calculates 73 the required offset within the cluster and copies the requireddata 74 to be passed to the application. The required length of copying data is calculated as follows: -
Length=Minimum{data range Y;(cluster size−offset mod cluster size)} - If the data range Y exceeds the cluster size, the operation is repeated 75.
- For example, referring to the
exemplary data block 50, request is to read data of 20 bytes length from the offset 1 MB+1340. Reading will start from the second cluster and, accordingly, the required data are contained in compressed data block starting from 2nd compressed section. The record of the 2nd compressed section in the section table contains CLUs withpointers compression system 20 and uncompressed to 1 MB buffer (e.g. in the compression system). Then 20 bytes from the buffer offset 1340 will be moved to the target (user's) buffer. The required length of copying data is 20 bytes (equal to minimum between 20 bytes and (1 MB-1340 bytes)). If the other request were to read data of 2 MB length from the same offset, the operation would be repeated in a similar manner to 3rd and 4th compressed sections; and the required length of data copying from the starting cluster is 1 MB-1340 bytes (equal to minimum between 2 MB and (1 MB-1340 bytes)). - Referring to
FIG. 8 , there is illustrated a generalized flowchart of write operation on a compressed data block in accordance with certain embodiments of the present invention. A “write”request 80 identifies the offset in VLU and the range Y of data to write. Thecompression system 20 calculates 81 the serial number of the 1st virtual storage cluster to be updated (overwrite) as integer of (offset divided by size of the cluster) and plus one if there is a remainder. The number of virtual storage clusters to overwrite is defined by integer of (range of data to write divided by size of the cluster) and plus one if there is a remainder. As a result, the compression system defines the compressed section(s) to overwrite and generates read request in a manner similar to that described with reference toFIG. 7 . After the entire compressed section corresponding to the starting cluster is read and uncompressed 82 by the compression system to the buffer, the compression system calculates 83 the required offset within the cluster as described with reference toFIG. 7 and updates (overwrites) the requireddata range 84. Then, the compression system compresses 85 the updated cluster, updates the section table and requests to write 86 the new compressed section to the compressed data block. If the data range Y exceeds the cluster size, the operation is repeated 87 for successive clusters. Upon the end of the process, the compression system updates the section table 88. - As described above, in certain embodiments of the present invention the storage location of required data may be accessed directly and, accordingly, read/update (and similar) operations require restoring merely the virtual clusters containing the required data range and not the entire data blocks.
- Typically, data block updating may cause fragmentation because of unused space aroused in allocated storage.
FIGS. 9 and 10 illustrate fragmentation handling algorithms of CLU management in accordance with certain embodiments of the present invention.FIG. 9 illustrates an algorithm of CLU management during write/update operation on a compressed section (step 86 inFIG. 8 ) in accordance with certain embodiments of the present invention. Before writing the updated compressed section, the compression system compares 91 the number of CLUs required for the updated and old compressed sections. If the number of CLUs is unchanged, thecompression system 20 requests to write the updated compressed section sequentially to all CLUs 92 corresponding to the old compressed section. If the new number of the required CLUs is less than the old number, the compressed section will be written sequentially on a part of CLUs corresponding to the old compression section. The information about released CLUs is updated 93 in a special list (queue) of free CLUs handled bycompression system 20 until the LU is disconnected. If the new number of the required CLUs is more than the old number, the compressed section will be written sequentially on all CLUs corresponding to the old compression section 94 and then on CLUs taken from the free CLUs queue 95. If still more CLUs are required, the compression system will define the last CLU allocated to the data block (#n) and request to write sequentially on CLUs starting with number (n+1) (96); the list of allocated CLUs will be accordingly updated 97. -
FIG. 10 illustrates an algorithm of CLU management during disconnecting from a storage logical unit. - Before disconnecting 102 from LU, the compression system checks 101 if the list of free CLUs is empty. If the list still comprises CLUs, the
compression system 20 defines a CLU with the highest storage location pointer among CLUs in-use. Compressed data contained in said CLU are transferred 103 to a free CLU with a lower pointer and the emptied CLU is added to the list of free CLUs. The process is repeated 104 until all the pointers of CLUs in-use are lower than the pointer of any CLU comprising in the list of free CLUs. The section table will be accordingly updated 105. Such updates may occur per each of said CLU re-writing, after the end of entire re-writing process or in accordance with other predefined criteria. At the end of the process the LU is disconnected and free CLUs are released 106. The selection of free CLU for above process may be provided in accordance with different algorithms. For example, in certain embodiments of the invention said compressed data from the CLU with the highest storage location pointer may be transferred to the free CLU with the lowest storage location pointer. - Referring to
FIGS. 11 a-11 c, there are illustrated relationship between CLUs and assigned disk memory segments in accordance with certain embodiments of the present invention.FIG. 11 a illustrates exemplary data block 50 illustrated inFIG. 5 when created as new compressed data block. The virtual (logical) sequence of CLUs is the same as physical sequence of disk segments corresponding to the CLUs (numbers within CLUs are illustrating pointers to the respective disk memory segments).FIG. 11 b illustrates the new distribution of CLUs within the updated compressed data block with unchanged size of the compressed sections as in the updated exemplary data block described with reference toFIG. 5 . The virtual (logical) sequence of CLUs differs from the physical sequence of disk segments corresponding to the CLUs whilst maintaining de-fragmented structure of the LU.FIG. 11 c illustrates the de-fragmented distribution of CLUs within updated exemplary compressed data block 50, wherein the size of 2nd compressed section has been changed after an update from 432111 to 200100 bytes. If, for example, the update offset is 1 MB+314 bytes, the first compressed section is unaffected during the update. The new size of 2nd compressed section requires allocation of only 4 CLUs ([200100/61440]+1). Note, as shown inFIG. 11B , that before the update the second compressed section accommodated 8 CLUs (Nos. 2, 3, 7, 10, 11, 12, 15 and 16). As described with reference toFIG. 9 , thecompression system 20 will write the updated 2nd compressed section on first 4 CLUs from the compressed section (2, 3, 7, 10 in the present example) and send CLUs withpointers FIG. 10 , thecompression system 20 before disconnecting from LU will check if the list of free CLUs is empty. By this example the list contains CLUs withstorage location pointers FIG. 10 , the compression system will re-write compressed data from CLU withpointer 13 to CLU withpointer 11; compressed data from CLU withpointer 16 to CLU withpointer 12 and release CLUs with pointers 13-16. Thus the updated data block has 12 allocated CLUs with no de-fragmentation. - Additional requirements (e.g. secure access, data integrity, etc.) may lead to more complicated communication between the compression system and the computer.
- It is also to be understood that the invention is not limited in its application to the details set forth in the description contained herein or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Hence, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting. As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for designing other structures, methods, and systems for carrying out the several purposes of the present invention.
- Those skilled in the art will readily appreciate that various modifications and changes can be applied to the embodiments of the invention as hereinbefore described without departing from its scope, defined in and by the appended claims.
Claims (21)
Priority Applications (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/194,678 US7970965B2 (en) | 2004-04-26 | 2008-08-20 | Method and system for compression of data for block mode access storage |
US13/108,201 US8327050B2 (en) | 2005-04-21 | 2011-05-16 | Systems and methods for compressing files for storage and operation on compressed files |
US13/108,212 US8473652B2 (en) | 2005-04-21 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,209 US8677039B2 (en) | 2005-04-21 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,221 US8856409B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,224 US8347004B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,205 US8285898B2 (en) | 2005-04-21 | 2011-05-16 | Method and system for compression of files for storage and operation on compressed files |
US13/108,218 US8347003B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/529,839 US8656075B2 (en) | 2005-04-21 | 2012-06-21 | Method and system for compression of files for storage and operation on compressed files |
US13/554,539 US8412868B2 (en) | 2005-04-21 | 2012-07-20 | Systems and methods for compressing files for storage and operation on compressed files |
US13/554,416 US8380900B2 (en) | 2005-04-21 | 2012-07-20 | Systems and methods for compressing files for storage and operation on compressed files |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US56529804P | 2004-04-26 | 2004-04-26 | |
PCT/IL2005/000419 WO2005103878A2 (en) | 2004-04-26 | 2005-04-21 | Method and system for compression of files for storage and operation on compressed files |
US11/258,379 US7424482B2 (en) | 2004-04-26 | 2005-10-26 | Method and system for compression of data for block mode access storage |
US12/194,678 US7970965B2 (en) | 2004-04-26 | 2008-08-20 | Method and system for compression of data for block mode access storage |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/258,379 Continuation US7424482B2 (en) | 2004-04-26 | 2005-10-26 | Method and system for compression of data for block mode access storage |
Related Child Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/108,201 Continuation-In-Part US8327050B2 (en) | 2005-04-21 | 2011-05-16 | Systems and methods for compressing files for storage and operation on compressed files |
US13/108,212 Continuation US8473652B2 (en) | 2005-04-21 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,218 Continuation-In-Part US8347003B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,209 Continuation US8677039B2 (en) | 2005-04-21 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,221 Continuation-In-Part US8856409B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,205 Continuation US8285898B2 (en) | 2005-04-21 | 2011-05-16 | Method and system for compression of files for storage and operation on compressed files |
US13/108,224 Continuation-In-Part US8347004B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080313371A1 true US20080313371A1 (en) | 2008-12-18 |
US7970965B2 US7970965B2 (en) | 2011-06-28 |
Family
ID=36597342
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/258,379 Expired - Fee Related US7424482B2 (en) | 2004-04-26 | 2005-10-26 | Method and system for compression of data for block mode access storage |
US12/194,678 Expired - Fee Related US7970965B2 (en) | 2004-04-26 | 2008-08-20 | Method and system for compression of data for block mode access storage |
US13/108,224 Active US8347004B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,218 Active US8347003B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,221 Active 2025-12-06 US8856409B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/258,379 Expired - Fee Related US7424482B2 (en) | 2004-04-26 | 2005-10-26 | Method and system for compression of data for block mode access storage |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/108,224 Active US8347004B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,218 Active US8347003B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
US13/108,221 Active 2025-12-06 US8856409B2 (en) | 2004-04-26 | 2011-05-16 | Systems and methods for compression of data for block mode access storage |
Country Status (1)
Country | Link |
---|---|
US (5) | US7424482B2 (en) |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060262851A1 (en) * | 2005-05-19 | 2006-11-23 | Celtro Ltd. | Method and system for efficient transmission of communication traffic |
US20070294320A1 (en) * | 2006-05-10 | 2007-12-20 | Emc Corporation | Automated priority restores |
US20080013365A1 (en) * | 2006-03-20 | 2008-01-17 | Emc Corporation | High efficiency portable archive |
US20080177934A1 (en) * | 2007-01-24 | 2008-07-24 | Samsung Electronics. Co., Ltd. | Memory systems having a multilevel cell flash memory and programming methods thereof |
US20090089454A1 (en) * | 2007-09-28 | 2009-04-02 | Ramakrishna Huggahalli | Network packet payload compression |
US20090187643A1 (en) * | 2008-01-23 | 2009-07-23 | Hang Ng | System and Method for Configuring Networked Enterprise Information Handling System Solutions From a Product and Options Template |
US7831787B1 (en) | 2006-03-20 | 2010-11-09 | Emc Corporation | High efficiency portable archive with virtualization |
US20110178988A1 (en) * | 2009-05-25 | 2011-07-21 | Hitachi, Ltd. | Computer system and its data control method |
US20130024632A1 (en) * | 2009-07-27 | 2013-01-24 | Jonathan Amit | Method and system for transformation of logical data objects for storage |
US20130262801A1 (en) * | 2011-09-30 | 2013-10-03 | Commvault Systems, Inc. | Information management of virtual machines having mapped storage devices |
US9235477B1 (en) * | 2006-04-24 | 2016-01-12 | Emc Corporation | Virtualized backup solution |
US9317222B1 (en) * | 2006-04-24 | 2016-04-19 | Emc Corporation | Centralized content addressed storage |
US9684739B1 (en) | 2006-05-11 | 2017-06-20 | EMC IP Holding Company LLC | View generator for managing data storage |
US10650057B2 (en) | 2014-07-16 | 2020-05-12 | Commvault Systems, Inc. | Volume or virtual machine level backup and generating placeholders for virtual machine files |
US10733143B2 (en) | 2012-12-21 | 2020-08-04 | Commvault Systems, Inc. | Systems and methods to identify unprotected virtual machines |
US10747630B2 (en) | 2016-09-30 | 2020-08-18 | Commvault Systems, Inc. | Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, including operations by a master monitor node |
US10768971B2 (en) | 2019-01-30 | 2020-09-08 | Commvault Systems, Inc. | Cross-hypervisor live mount of backed up virtual machine data |
US10776209B2 (en) | 2014-11-10 | 2020-09-15 | Commvault Systems, Inc. | Cross-platform virtual machine backup and replication |
US10824464B2 (en) | 2012-12-21 | 2020-11-03 | Commvault Systems, Inc. | Archiving virtual machines in a data storage system |
US10824459B2 (en) | 2016-10-25 | 2020-11-03 | Commvault Systems, Inc. | Targeted snapshot based on virtual machine location |
US10877928B2 (en) | 2018-03-07 | 2020-12-29 | Commvault Systems, Inc. | Using utilities injected into cloud-based virtual machines for speeding up virtual machine backup operations |
US10877851B2 (en) | 2017-03-24 | 2020-12-29 | Commvault Systems, Inc. | Virtual machine recovery point selection |
US10896053B2 (en) | 2013-01-08 | 2021-01-19 | Commvault Systems, Inc. | Virtual machine load balancing |
US11010011B2 (en) | 2013-09-12 | 2021-05-18 | Commvault Systems, Inc. | File manager integration with virtualization in an information management system with an enhanced storage manager, including user control and storage management of virtual machines |
US11249864B2 (en) | 2017-03-29 | 2022-02-15 | Commvault Systems, Inc. | External dynamic virtual machine synchronization |
US11321189B2 (en) | 2014-04-02 | 2022-05-03 | Commvault Systems, Inc. | Information management by a media agent in the absence of communications with a storage manager |
US11422709B2 (en) | 2014-11-20 | 2022-08-23 | Commvault Systems, Inc. | Virtual machine change block tracking |
US11436210B2 (en) | 2008-09-05 | 2022-09-06 | Commvault Systems, Inc. | Classification of virtualization data |
US11436202B2 (en) | 2016-11-21 | 2022-09-06 | Commvault Systems, Inc. | Cross-platform virtual machine data and memory backup and replication |
US11442768B2 (en) | 2020-03-12 | 2022-09-13 | Commvault Systems, Inc. | Cross-hypervisor live recovery of virtual machines |
US11449394B2 (en) | 2010-06-04 | 2022-09-20 | Commvault Systems, Inc. | Failover systems and methods for performing backup operations, including heterogeneous indexing and load balancing of backup and indexing resources |
US11467753B2 (en) | 2020-02-14 | 2022-10-11 | Commvault Systems, Inc. | On-demand restore of virtual machine data |
US11500669B2 (en) | 2020-05-15 | 2022-11-15 | Commvault Systems, Inc. | Live recovery of virtual machines in a public cloud computing environment |
US11550680B2 (en) | 2018-12-06 | 2023-01-10 | Commvault Systems, Inc. | Assigning backup resources in a data storage management system based on failover of partnered data storage resources |
US11656951B2 (en) | 2020-10-28 | 2023-05-23 | Commvault Systems, Inc. | Data loss vulnerability detection |
US11663099B2 (en) | 2020-03-26 | 2023-05-30 | Commvault Systems, Inc. | Snapshot-based disaster recovery orchestration of virtual machine failover and failback operations |
Families Citing this family (186)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7529972B2 (en) * | 2006-01-03 | 2009-05-05 | Emc Corporation | Methods and apparatus for reconfiguring a storage system |
WO2007138603A2 (en) | 2006-05-31 | 2007-12-06 | Storwize Ltd. | Method and system for transformation of logical data objects for storage |
US8868930B2 (en) * | 2006-05-31 | 2014-10-21 | International Business Machines Corporation | Systems and methods for transformation of logical data objects for storage |
JP5037952B2 (en) * | 2007-01-15 | 2012-10-03 | 株式会社日立製作所 | Storage system and storage system control method |
US8433747B2 (en) * | 2008-02-01 | 2013-04-30 | Microsoft Corporation | Graphics remoting architecture |
US20090282064A1 (en) * | 2008-05-07 | 2009-11-12 | Veeramanikandan Raju | On the fly compression and storage device, system and method |
US10698859B2 (en) | 2009-09-18 | 2020-06-30 | The Board Of Regents Of The University Of Texas System | Data multicasting with router replication and target instruction identification in a distributed multi-core processing architecture |
US8510275B2 (en) * | 2009-09-21 | 2013-08-13 | Dell Products L.P. | File aware block level deduplication |
KR20110113420A (en) * | 2010-04-09 | 2011-10-17 | 삼성전자주식회사 | Method of storing data in storage media, data storage device using the same, and system including the same |
KR101643273B1 (en) | 2010-04-09 | 2016-08-01 | 삼성전자주식회사 | Method of storing data in storage media, data storage device using the same, and system including the same |
KR20110113421A (en) * | 2010-04-09 | 2011-10-17 | 삼성전자주식회사 | Method of storing data in storage media, data storage device using the same, and system including the same |
JP5707011B2 (en) | 2010-06-18 | 2015-04-22 | ボード・オブ・リージエンツ,ザ・ユニバーシテイ・オブ・テキサス・システム | Integrated branch destination / predicate prediction |
US8589655B2 (en) | 2010-09-15 | 2013-11-19 | Pure Storage, Inc. | Scheduling of I/O in an SSD environment |
US8589625B2 (en) | 2010-09-15 | 2013-11-19 | Pure Storage, Inc. | Scheduling of reconstructive I/O read operations in a storage environment |
US11614893B2 (en) | 2010-09-15 | 2023-03-28 | Pure Storage, Inc. | Optimizing storage device access based on latency |
US11275509B1 (en) | 2010-09-15 | 2022-03-15 | Pure Storage, Inc. | Intelligently sizing high latency I/O requests in a storage environment |
US8468318B2 (en) | 2010-09-15 | 2013-06-18 | Pure Storage Inc. | Scheduling of I/O writes in a storage environment |
US8732426B2 (en) | 2010-09-15 | 2014-05-20 | Pure Storage, Inc. | Scheduling of reactive I/O operations in a storage environment |
US9244769B2 (en) | 2010-09-28 | 2016-01-26 | Pure Storage, Inc. | Offset protection data in a RAID array |
US8775868B2 (en) | 2010-09-28 | 2014-07-08 | Pure Storage, Inc. | Adaptive RAID for an SSD environment |
EP2622469B1 (en) | 2010-09-30 | 2019-11-13 | Commvault Systems, Inc. | Efficient data management improvements, such as docking limited-feature data management modules to a full-featured data management system |
US9852143B2 (en) * | 2010-12-17 | 2017-12-26 | Microsoft Technology Licensing, Llc | Enabling random access within objects in zip archives |
US8745338B1 (en) | 2011-05-02 | 2014-06-03 | Netapp, Inc. | Overwriting part of compressed data without decompressing on-disk compressed data |
US8972360B2 (en) | 2011-05-23 | 2015-03-03 | International Business Machines Corporation | Position invariant compression of files within a multi-level compression scheme |
US11636031B2 (en) | 2011-08-11 | 2023-04-25 | Pure Storage, Inc. | Optimized inline deduplication |
US8793467B2 (en) | 2011-09-30 | 2014-07-29 | Pure Storage, Inc. | Variable length encoding in a storage system |
US8589640B2 (en) | 2011-10-14 | 2013-11-19 | Pure Storage, Inc. | Method for maintaining multiple fingerprint tables in a deduplicating storage system |
US8819361B2 (en) | 2011-09-12 | 2014-08-26 | Microsoft Corporation | Retaining verifiability of extracted data from signed archives |
US8839446B2 (en) | 2011-09-12 | 2014-09-16 | Microsoft Corporation | Protecting archive structure with directory verifiers |
US8972967B2 (en) | 2011-09-12 | 2015-03-03 | Microsoft Corporation | Application packages using block maps |
US9461881B2 (en) | 2011-09-30 | 2016-10-04 | Commvault Systems, Inc. | Migration of existing computing systems to cloud computing sites or virtual machines |
KR101888074B1 (en) | 2012-01-09 | 2018-08-13 | 삼성전자주식회사 | Storage device and nonvolatile memory device and operation method thererof |
JP5687639B2 (en) * | 2012-02-08 | 2015-03-18 | 株式会社東芝 | Controller, data storage device and program |
US8719540B1 (en) | 2012-03-15 | 2014-05-06 | Pure Storage, Inc. | Fractal layout of data blocks across multiple devices |
US8756208B2 (en) | 2012-07-10 | 2014-06-17 | International Business Machines Corporation | Encoded data processing |
US11032259B1 (en) | 2012-09-26 | 2021-06-08 | Pure Storage, Inc. | Data protection in a storage system |
US8745415B2 (en) | 2012-09-26 | 2014-06-03 | Pure Storage, Inc. | Multi-drive cooperation to generate an encryption key |
US10623386B1 (en) | 2012-09-26 | 2020-04-14 | Pure Storage, Inc. | Secret sharing data protection in a storage system |
US8959301B2 (en) | 2012-11-09 | 2015-02-17 | International Business Machines Corporation | Accessing data in a storage system |
US9378035B2 (en) | 2012-12-28 | 2016-06-28 | Commvault Systems, Inc. | Systems and methods for repurposing virtual machines |
US10908835B1 (en) | 2013-01-10 | 2021-02-02 | Pure Storage, Inc. | Reversing deletion of a virtual machine |
US11768623B2 (en) | 2013-01-10 | 2023-09-26 | Pure Storage, Inc. | Optimizing generalized transfers between storage systems |
US11733908B2 (en) | 2013-01-10 | 2023-08-22 | Pure Storage, Inc. | Delaying deletion of a dataset |
US9063967B2 (en) | 2013-01-10 | 2015-06-23 | Pure Storage, Inc. | Performing copies in a storage system |
US11036392B2 (en) * | 2013-02-26 | 2021-06-15 | Pure Storage, Inc. | Determining when to use convergent encryption |
US9805046B2 (en) | 2013-03-14 | 2017-10-31 | International Business Machines Corporation | Data compression using compression blocks and partitions |
US11128448B1 (en) | 2013-11-06 | 2021-09-21 | Pure Storage, Inc. | Quorum-aware secret sharing |
US10365858B2 (en) | 2013-11-06 | 2019-07-30 | Pure Storage, Inc. | Thin provisioning in a storage device |
US10263770B2 (en) | 2013-11-06 | 2019-04-16 | Pure Storage, Inc. | Data protection in a storage system using external secrets |
CN108108311A (en) * | 2013-12-12 | 2018-06-01 | 株式会社日立制作所 | The control method of storage device and storage device |
US9208086B1 (en) | 2014-01-09 | 2015-12-08 | Pure Storage, Inc. | Using frequency domain to prioritize storage of metadata in a cache |
US10656864B2 (en) | 2014-03-20 | 2020-05-19 | Pure Storage, Inc. | Data replication within a flash storage array |
US9779268B1 (en) | 2014-06-03 | 2017-10-03 | Pure Storage, Inc. | Utilizing a non-repeating identifier to encrypt data |
US11399063B2 (en) | 2014-06-04 | 2022-07-26 | Pure Storage, Inc. | Network authentication for a storage system |
US9218244B1 (en) | 2014-06-04 | 2015-12-22 | Pure Storage, Inc. | Rebuilding data across storage nodes |
US10496556B1 (en) | 2014-06-25 | 2019-12-03 | Pure Storage, Inc. | Dynamic data protection within a flash storage system |
US9218407B1 (en) | 2014-06-25 | 2015-12-22 | Pure Storage, Inc. | Replication and intermediate read-write state for mediums |
WO2015199574A1 (en) * | 2014-06-27 | 2015-12-30 | Emc Corporation | Techniques for automatically freeing space in a log-structured storage system |
US10296469B1 (en) | 2014-07-24 | 2019-05-21 | Pure Storage, Inc. | Access control in a flash storage system |
US9558069B2 (en) | 2014-08-07 | 2017-01-31 | Pure Storage, Inc. | Failure mapping in a storage array |
US9495255B2 (en) | 2014-08-07 | 2016-11-15 | Pure Storage, Inc. | Error recovery in a storage cluster |
US9864761B1 (en) | 2014-08-08 | 2018-01-09 | Pure Storage, Inc. | Read optimization operations in a storage system |
US10430079B2 (en) | 2014-09-08 | 2019-10-01 | Pure Storage, Inc. | Adjusting storage capacity in a computing system |
US10164841B2 (en) | 2014-10-02 | 2018-12-25 | Pure Storage, Inc. | Cloud assist for storage systems |
US9489132B2 (en) | 2014-10-07 | 2016-11-08 | Pure Storage, Inc. | Utilizing unmapped and unknown states in a replicated storage system |
US10430282B2 (en) | 2014-10-07 | 2019-10-01 | Pure Storage, Inc. | Optimizing replication by distinguishing user and system write activity |
US9727485B1 (en) | 2014-11-24 | 2017-08-08 | Pure Storage, Inc. | Metadata rewrite and flatten optimization |
US9773007B1 (en) | 2014-12-01 | 2017-09-26 | Pure Storage, Inc. | Performance improvements in a storage system |
US9588842B1 (en) | 2014-12-11 | 2017-03-07 | Pure Storage, Inc. | Drive rebuild |
US9552248B2 (en) | 2014-12-11 | 2017-01-24 | Pure Storage, Inc. | Cloud alert to replica |
US9864769B2 (en) | 2014-12-12 | 2018-01-09 | Pure Storage, Inc. | Storing data utilizing repeating pattern detection |
US10545987B2 (en) | 2014-12-19 | 2020-01-28 | Pure Storage, Inc. | Replication to the cloud |
US11947968B2 (en) | 2015-01-21 | 2024-04-02 | Pure Storage, Inc. | Efficient use of zone in a storage device |
US10296354B1 (en) | 2015-01-21 | 2019-05-21 | Pure Storage, Inc. | Optimized boot operations within a flash storage array |
US9922114B2 (en) | 2015-01-30 | 2018-03-20 | Splunk Inc. | Systems and methods for distributing indexer configurations |
US10572863B2 (en) | 2015-01-30 | 2020-02-25 | Splunk Inc. | Systems and methods for managing allocation of machine data storage |
US9710165B1 (en) | 2015-02-18 | 2017-07-18 | Pure Storage, Inc. | Identifying volume candidates for space reclamation |
JP2016170750A (en) * | 2015-03-16 | 2016-09-23 | 富士通株式会社 | Data management program, information processor and data management method |
US10082985B2 (en) | 2015-03-27 | 2018-09-25 | Pure Storage, Inc. | Data striping across storage nodes that are assigned to multiple logical arrays |
US10178169B2 (en) | 2015-04-09 | 2019-01-08 | Pure Storage, Inc. | Point to point based backend communication layer for storage processing |
US10140149B1 (en) | 2015-05-19 | 2018-11-27 | Pure Storage, Inc. | Transactional commits with hardware assists in remote memory |
US10084873B2 (en) | 2015-06-19 | 2018-09-25 | Commvault Systems, Inc. | Assignment of data agent proxies for executing virtual-machine secondary copy operations including streaming backup jobs |
US9563514B2 (en) | 2015-06-19 | 2017-02-07 | Commvault Systems, Inc. | Assignment of proxies for virtual-machine secondary copy operations including streaming backup jobs |
US9547441B1 (en) | 2015-06-23 | 2017-01-17 | Pure Storage, Inc. | Exposing a geometry of a storage device |
US10310740B2 (en) | 2015-06-23 | 2019-06-04 | Pure Storage, Inc. | Aligning memory access operations to a geometry of a storage device |
US20170038978A1 (en) * | 2015-08-05 | 2017-02-09 | HGST Netherlands B.V. | Delta Compression Engine for Similarity Based Data Deduplication |
US11341136B2 (en) | 2015-09-04 | 2022-05-24 | Pure Storage, Inc. | Dynamically resizable structures for approximate membership queries |
KR20170028825A (en) | 2015-09-04 | 2017-03-14 | 퓨어 스토리지, 아이앤씨. | Memory-efficient storage and searching in hash tables using compressed indexes |
US11269884B2 (en) | 2015-09-04 | 2022-03-08 | Pure Storage, Inc. | Dynamically resizable structures for approximate membership queries |
US10776115B2 (en) | 2015-09-19 | 2020-09-15 | Microsoft Technology Licensing, Llc | Debug support for block-based processor |
US10452399B2 (en) | 2015-09-19 | 2019-10-22 | Microsoft Technology Licensing, Llc | Broadcast channel architectures for block-based processors |
US10719321B2 (en) | 2015-09-19 | 2020-07-21 | Microsoft Technology Licensing, Llc | Prefetching instruction blocks |
US10768936B2 (en) | 2015-09-19 | 2020-09-08 | Microsoft Technology Licensing, Llc | Block-based processor including topology and control registers to indicate resource sharing and size of logical processor |
US10198263B2 (en) | 2015-09-19 | 2019-02-05 | Microsoft Technology Licensing, Llc | Write nullification |
US11016770B2 (en) | 2015-09-19 | 2021-05-25 | Microsoft Technology Licensing, Llc | Distinct system registers for logical processors |
US10678544B2 (en) | 2015-09-19 | 2020-06-09 | Microsoft Technology Licensing, Llc | Initiating instruction block execution using a register access instruction |
US10936316B2 (en) | 2015-09-19 | 2021-03-02 | Microsoft Technology Licensing, Llc | Dense read encoding for dataflow ISA |
US20170083327A1 (en) | 2015-09-19 | 2017-03-23 | Microsoft Technology Licensing, Llc | Implicit program order |
US11126433B2 (en) | 2015-09-19 | 2021-09-21 | Microsoft Technology Licensing, Llc | Block-based processor core composition register |
US10180840B2 (en) | 2015-09-19 | 2019-01-15 | Microsoft Technology Licensing, Llc | Dynamic generation of null instructions |
US11681531B2 (en) | 2015-09-19 | 2023-06-20 | Microsoft Technology Licensing, Llc | Generation and use of memory access instruction order encodings |
US10871967B2 (en) | 2015-09-19 | 2020-12-22 | Microsoft Technology Licensing, Llc | Register read/write ordering |
US9843453B2 (en) | 2015-10-23 | 2017-12-12 | Pure Storage, Inc. | Authorizing I/O commands with I/O tokens |
US11144445B1 (en) * | 2016-03-28 | 2021-10-12 | Dell Products L.P. | Use of compression domains that are more granular than storage allocation units |
US10133503B1 (en) | 2016-05-02 | 2018-11-20 | Pure Storage, Inc. | Selecting a deduplication process based on a difference between performance metrics |
US10452297B1 (en) | 2016-05-02 | 2019-10-22 | Pure Storage, Inc. | Generating and optimizing summary index levels in a deduplication storage system |
US10203903B2 (en) | 2016-07-26 | 2019-02-12 | Pure Storage, Inc. | Geometry based, space aware shelf/writegroup evacuation |
US10191662B2 (en) | 2016-10-04 | 2019-01-29 | Pure Storage, Inc. | Dynamic allocation of segments in a flash storage system |
US10613974B2 (en) | 2016-10-04 | 2020-04-07 | Pure Storage, Inc. | Peer-to-peer non-volatile random-access memory |
US10756816B1 (en) | 2016-10-04 | 2020-08-25 | Pure Storage, Inc. | Optimized fibre channel and non-volatile memory express access |
US10162523B2 (en) | 2016-10-04 | 2018-12-25 | Pure Storage, Inc. | Migrating data between volumes using virtual copy operation |
US10481798B2 (en) | 2016-10-28 | 2019-11-19 | Pure Storage, Inc. | Efficient flash management for multiple controllers |
US10185505B1 (en) | 2016-10-28 | 2019-01-22 | Pure Storage, Inc. | Reading a portion of data to replicate a volume based on sequence numbers |
US10359942B2 (en) | 2016-10-31 | 2019-07-23 | Pure Storage, Inc. | Deduplication aware scalable content placement |
US10452290B2 (en) | 2016-12-19 | 2019-10-22 | Pure Storage, Inc. | Block consolidation in a direct-mapped flash storage system |
US11550481B2 (en) | 2016-12-19 | 2023-01-10 | Pure Storage, Inc. | Efficiently writing data in a zoned drive storage system |
US11093146B2 (en) | 2017-01-12 | 2021-08-17 | Pure Storage, Inc. | Automatic load rebalancing of a write group |
US10949308B2 (en) | 2017-03-15 | 2021-03-16 | Commvault Systems, Inc. | Application aware backup of virtual machines |
US10528488B1 (en) | 2017-03-30 | 2020-01-07 | Pure Storage, Inc. | Efficient name coding |
US10853195B2 (en) | 2017-03-31 | 2020-12-01 | Commvault Systems, Inc. | Granular restoration of virtual machine application data |
US10282127B2 (en) | 2017-04-20 | 2019-05-07 | Western Digital Technologies, Inc. | Managing data in a storage system |
US11403019B2 (en) | 2017-04-21 | 2022-08-02 | Pure Storage, Inc. | Deduplication-aware per-tenant encryption |
US10944671B2 (en) | 2017-04-27 | 2021-03-09 | Pure Storage, Inc. | Efficient data forwarding in a networked device |
US10809928B2 (en) | 2017-06-02 | 2020-10-20 | Western Digital Technologies, Inc. | Efficient data deduplication leveraging sequential chunks or auxiliary databases |
US10503608B2 (en) | 2017-07-24 | 2019-12-10 | Western Digital Technologies, Inc. | Efficient management of reference blocks used in data deduplication |
US10402266B1 (en) | 2017-07-31 | 2019-09-03 | Pure Storage, Inc. | Redundant array of independent disks in a direct-mapped flash storage system |
US11526469B1 (en) * | 2017-07-31 | 2022-12-13 | EMC IP Holding Company LLC | File system reorganization in the presence of inline compression |
JP7013732B2 (en) * | 2017-08-31 | 2022-02-01 | 富士通株式会社 | Information processing equipment, information processing methods and programs |
US10831935B2 (en) | 2017-08-31 | 2020-11-10 | Pure Storage, Inc. | Encryption management with host-side data reduction |
US10776202B1 (en) | 2017-09-22 | 2020-09-15 | Pure Storage, Inc. | Drive, blade, or data shard decommission via RAID geometry shrinkage |
US10789211B1 (en) | 2017-10-04 | 2020-09-29 | Pure Storage, Inc. | Feature-based deduplication |
US10884919B2 (en) | 2017-10-31 | 2021-01-05 | Pure Storage, Inc. | Memory management in a storage system |
US10860475B1 (en) | 2017-11-17 | 2020-12-08 | Pure Storage, Inc. | Hybrid flash translation layer |
US10929031B2 (en) | 2017-12-21 | 2021-02-23 | Pure Storage, Inc. | Maximizing data reduction in a partially encrypted volume |
US10970395B1 (en) | 2018-01-18 | 2021-04-06 | Pure Storage, Inc | Security threat monitoring for a storage system |
US11144638B1 (en) | 2018-01-18 | 2021-10-12 | Pure Storage, Inc. | Method for storage system detection and alerting on potential malicious action |
US11010233B1 (en) | 2018-01-18 | 2021-05-18 | Pure Storage, Inc | Hardware-based system monitoring |
US10467527B1 (en) | 2018-01-31 | 2019-11-05 | Pure Storage, Inc. | Method and apparatus for artificial intelligence acceleration |
US11036596B1 (en) | 2018-02-18 | 2021-06-15 | Pure Storage, Inc. | System for delaying acknowledgements on open NAND locations until durability has been confirmed |
US11494109B1 (en) | 2018-02-22 | 2022-11-08 | Pure Storage, Inc. | Erase block trimming for heterogenous flash memory storage devices |
US11934322B1 (en) | 2018-04-05 | 2024-03-19 | Pure Storage, Inc. | Multiple encryption keys on storage drives |
US10678433B1 (en) | 2018-04-27 | 2020-06-09 | Pure Storage, Inc. | Resource-preserving system upgrade |
US11385792B2 (en) | 2018-04-27 | 2022-07-12 | Pure Storage, Inc. | High availability controller pair transitioning |
US10678436B1 (en) | 2018-05-29 | 2020-06-09 | Pure Storage, Inc. | Using a PID controller to opportunistically compress more data during garbage collection |
US11436023B2 (en) | 2018-05-31 | 2022-09-06 | Pure Storage, Inc. | Mechanism for updating host file system and flash translation layer based on underlying NAND technology |
US10776046B1 (en) | 2018-06-08 | 2020-09-15 | Pure Storage, Inc. | Optimized non-uniform memory access |
US11281577B1 (en) | 2018-06-19 | 2022-03-22 | Pure Storage, Inc. | Garbage collection tuning for low drive wear |
US11086534B2 (en) | 2018-06-28 | 2021-08-10 | Apple Inc. | Memory data distribution based on communication channel utilization |
US11869586B2 (en) | 2018-07-11 | 2024-01-09 | Pure Storage, Inc. | Increased data protection by recovering data from partially-failed solid-state devices |
US11194759B2 (en) | 2018-09-06 | 2021-12-07 | Pure Storage, Inc. | Optimizing local data relocation operations of a storage device of a storage system |
US11133076B2 (en) | 2018-09-06 | 2021-09-28 | Pure Storage, Inc. | Efficient relocation of data between storage devices of a storage system |
US10846216B2 (en) | 2018-10-25 | 2020-11-24 | Pure Storage, Inc. | Scalable garbage collection |
US11113409B2 (en) | 2018-10-26 | 2021-09-07 | Pure Storage, Inc. | Efficient rekey in a transparent decrypting storage array |
CN109669640B (en) * | 2018-12-24 | 2023-05-23 | 浙江大华技术股份有限公司 | Data storage method, device, electronic equipment and medium |
US11194473B1 (en) | 2019-01-23 | 2021-12-07 | Pure Storage, Inc. | Programming frequently read data to low latency portions of a solid-state storage array |
US11588633B1 (en) | 2019-03-15 | 2023-02-21 | Pure Storage, Inc. | Decommissioning keys in a decryption storage system |
US11334254B2 (en) | 2019-03-29 | 2022-05-17 | Pure Storage, Inc. | Reliability based flash page sizing |
US11397674B1 (en) | 2019-04-03 | 2022-07-26 | Pure Storage, Inc. | Optimizing garbage collection across heterogeneous flash devices |
US11775189B2 (en) | 2019-04-03 | 2023-10-03 | Pure Storage, Inc. | Segment level heterogeneity |
US10990480B1 (en) | 2019-04-05 | 2021-04-27 | Pure Storage, Inc. | Performance of RAID rebuild operations by a storage group controller of a storage system |
US11099986B2 (en) | 2019-04-12 | 2021-08-24 | Pure Storage, Inc. | Efficient transfer of memory contents |
US11487665B2 (en) | 2019-06-05 | 2022-11-01 | Pure Storage, Inc. | Tiered caching of data in a storage system |
US11281394B2 (en) | 2019-06-24 | 2022-03-22 | Pure Storage, Inc. | Replication across partitioning schemes in a distributed storage system |
AU2019452898A1 (en) * | 2019-07-02 | 2022-01-06 | Microsoft Technology Licensing, Llc | Hardware-based memory compression |
US10929046B2 (en) | 2019-07-09 | 2021-02-23 | Pure Storage, Inc. | Identifying and relocating hot data to a cache determined with read velocity based on a threshold stored at a storage device |
US11422751B2 (en) | 2019-07-18 | 2022-08-23 | Pure Storage, Inc. | Creating a virtual storage system |
US11086713B1 (en) | 2019-07-23 | 2021-08-10 | Pure Storage, Inc. | Optimized end-to-end integrity storage system |
US11963321B2 (en) | 2019-09-11 | 2024-04-16 | Pure Storage, Inc. | Low profile latching mechanism |
US11403043B2 (en) | 2019-10-15 | 2022-08-02 | Pure Storage, Inc. | Efficient data compression by grouping similar data within a data segment |
US11520907B1 (en) | 2019-11-22 | 2022-12-06 | Pure Storage, Inc. | Storage system snapshot retention based on encrypted data |
US11651075B2 (en) | 2019-11-22 | 2023-05-16 | Pure Storage, Inc. | Extensible attack monitoring by a storage system |
US11687418B2 (en) | 2019-11-22 | 2023-06-27 | Pure Storage, Inc. | Automatic generation of recovery plans specific to individual storage elements |
US11755751B2 (en) | 2019-11-22 | 2023-09-12 | Pure Storage, Inc. | Modify access restrictions in response to a possible attack against data stored by a storage system |
US11720714B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Inter-I/O relationship based detection of a security threat to a storage system |
US11500788B2 (en) | 2019-11-22 | 2022-11-15 | Pure Storage, Inc. | Logical address based authorization of operations with respect to a storage system |
US11615185B2 (en) | 2019-11-22 | 2023-03-28 | Pure Storage, Inc. | Multi-layer security threat detection for a storage system |
US11941116B2 (en) | 2019-11-22 | 2024-03-26 | Pure Storage, Inc. | Ransomware-based data protection parameter modification |
US11675898B2 (en) | 2019-11-22 | 2023-06-13 | Pure Storage, Inc. | Recovery dataset management for security threat monitoring |
US11720692B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Hardware token based management of recovery datasets for a storage system |
US11625481B2 (en) | 2019-11-22 | 2023-04-11 | Pure Storage, Inc. | Selective throttling of operations potentially related to a security threat to a storage system |
US11645162B2 (en) | 2019-11-22 | 2023-05-09 | Pure Storage, Inc. | Recovery point determination for data restoration in a storage system |
US11341236B2 (en) | 2019-11-22 | 2022-05-24 | Pure Storage, Inc. | Traffic-based detection of a security threat to a storage system |
US11657155B2 (en) | 2019-11-22 | 2023-05-23 | Pure Storage, Inc | Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system |
US11681659B2 (en) * | 2021-05-21 | 2023-06-20 | Red Hat, Inc. | Hybrid file compression model |
CN114979094A (en) * | 2022-05-13 | 2022-08-30 | 深圳智慧林网络科技有限公司 | Data transmission method, device, equipment and medium based on RTP |
CN115865097B (en) * | 2023-02-17 | 2023-05-23 | 浪潮电子信息产业股份有限公司 | Data compression method, system, equipment and computer readable storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5774715A (en) * | 1996-03-27 | 1998-06-30 | Sun Microsystems, Inc. | File system level compression using holes |
US5813011A (en) * | 1995-05-12 | 1998-09-22 | Fujitsu Limited | Storage of a compressed file containing its own compression management table |
US5813017A (en) * | 1994-10-24 | 1998-09-22 | International Business Machines Corporation | System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing |
US6092071A (en) * | 1997-11-04 | 2000-07-18 | International Business Machines Corporation | Dedicated input/output processor method and apparatus for access and storage of compressed data |
US6115787A (en) * | 1996-11-05 | 2000-09-05 | Hitachi, Ltd. | Disc storage system having cache memory which stores compressed data |
US6145069A (en) * | 1999-01-29 | 2000-11-07 | Interactive Silicon, Inc. | Parallel decompression and compression system and method for improving storage density and access speed for non-volatile memory and embedded memory devices |
US6349375B1 (en) * | 1994-02-02 | 2002-02-19 | Compaq Computer Corporation | Compression of data in read only storage and embedded systems |
US6532121B1 (en) * | 1999-10-25 | 2003-03-11 | Hewlett-Packard Company | Compression algorithm with embedded meta-data for partial record operation augmented with expansion joints |
US6577734B1 (en) * | 1995-10-31 | 2003-06-10 | Lucent Technologies Inc. | Data encryption key management system |
US6584520B1 (en) * | 1994-06-20 | 2003-06-24 | Richard Cowart | Method for dynamically generating a file allocation table base upon files storage information on a CD-ROM for retrieving compressed files directly from the CD-ROM |
US6678828B1 (en) * | 2002-07-22 | 2004-01-13 | Vormetric, Inc. | Secure network file access control system |
US20040030813A1 (en) * | 2002-08-08 | 2004-02-12 | International Business Machines Corporation | Method and system for storing memory compressed data onto memory compressed disks |
US20050021657A1 (en) * | 2003-04-21 | 2005-01-27 | International Business Machines Corp. | Network system, server, data processing method and program |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5481701A (en) | 1991-09-13 | 1996-01-02 | Salient Software, Inc. | Method and apparatus for performing direct read of compressed data file |
US5649151A (en) * | 1992-06-29 | 1997-07-15 | Apple Computer, Inc. | Efficient method and apparatus for access and storage of compressed data |
US5305295A (en) * | 1992-06-29 | 1994-04-19 | Apple Computer, Inc. | Efficient method and apparatus for access and storage of compressed data |
US5991753A (en) | 1993-06-16 | 1999-11-23 | Lachman Technology, Inc. | Method and system for computer file management, including file migration, special handling, and associating extended attributes with files |
AU1447295A (en) | 1993-12-30 | 1995-08-01 | Connectix Corporation | Virtual memory management system and method using data compression |
US5488365A (en) | 1994-03-01 | 1996-01-30 | Hewlett-Packard Company | Method and apparatus for compressing and decompressing short blocks of data |
CN1157653C (en) | 1994-04-22 | 2004-07-14 | 索尼公司 | Device and method for transmitting data, and device and method for recording data |
JP2831602B2 (en) | 1995-01-13 | 1998-12-02 | 富士通株式会社 | Compressed data management device and compressed data management method |
US5778411A (en) * | 1995-05-16 | 1998-07-07 | Symbios, Inc. | Method for virtual to physical mapping in a mapped compressed virtual storage subsystem |
US5809295A (en) | 1995-09-26 | 1998-09-15 | Microsoft Corporation | Method and apparatus for storing compressed file data on a disk where each MDFAT data structure includes an extra byte |
US5765173A (en) * | 1996-01-11 | 1998-06-09 | Connected Corporation | High performance backup via selective file saving which can perform incremental backups and exclude files and uses a changed block signature list |
US5907703A (en) * | 1996-05-08 | 1999-05-25 | Mijenix Corporation | Device driver for accessing computer files |
US5761536A (en) | 1996-08-21 | 1998-06-02 | International Business Machines Corporation | System and method for reducing memory fragmentation by assigning remainders to share memory blocks on a best fit basis |
US6112024A (en) | 1996-10-02 | 2000-08-29 | Sybase, Inc. | Development system providing methods for managing different versions of objects with a meta model |
US6624761B2 (en) | 1998-12-11 | 2003-09-23 | Realtime Data, Llc | Content independent data compression method and system |
FI991261A (en) | 1999-06-02 | 2000-12-03 | Nokia Networks Oy | Functional memory based on tree structure |
AU7735600A (en) | 1999-10-01 | 2001-05-10 | Infraworks Corporation | Port blocking method and system |
JP4424845B2 (en) | 1999-12-20 | 2010-03-03 | 本田 正 | Image data compression method and decompression method |
US6728785B1 (en) | 2000-06-23 | 2004-04-27 | Cloudshield Technologies, Inc. | System and method for dynamic compression of data |
WO2002039305A1 (en) | 2000-11-09 | 2002-05-16 | Sri International | Information management via delegated control |
US20020107988A1 (en) | 2001-02-05 | 2002-08-08 | James Jordan | In-line compression system for low-bandwidth client-server data link |
US8402005B2 (en) | 2001-03-27 | 2013-03-19 | Intel Corporation | Systems and methods for creating self-extracting files |
AU2002313583A1 (en) | 2001-08-01 | 2003-02-17 | Actona Technologies Ltd. | Virtual file-sharing network |
US7058783B2 (en) * | 2002-09-18 | 2006-06-06 | Oracle International Corporation | Method and mechanism for on-line data compression and in-place updates |
US7228925B2 (en) * | 2002-10-04 | 2007-06-12 | Tesla Capital, Llc | Electrical systems for electric powered vehicles |
US20050033988A1 (en) * | 2002-10-18 | 2005-02-10 | Neoscale Systems, Inc. | Method and system for transparent encryption and authentication of file data protocols over internet protocol |
US7536418B2 (en) | 2003-01-10 | 2009-05-19 | At&T Intellectual Property Ii, Lp | Preload library for transparent file transformation |
US7117204B2 (en) | 2003-12-03 | 2006-10-03 | International Business Machines Corporation | Transparent content addressable data storage and compression for a file system |
US7430638B2 (en) * | 2004-06-14 | 2008-09-30 | Mossman Holdings Llc | Adaptive input / output compressed system and data cache and system using same |
-
2005
- 2005-10-26 US US11/258,379 patent/US7424482B2/en not_active Expired - Fee Related
-
2008
- 2008-08-20 US US12/194,678 patent/US7970965B2/en not_active Expired - Fee Related
-
2011
- 2011-05-16 US US13/108,224 patent/US8347004B2/en active Active
- 2011-05-16 US US13/108,218 patent/US8347003B2/en active Active
- 2011-05-16 US US13/108,221 patent/US8856409B2/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6349375B1 (en) * | 1994-02-02 | 2002-02-19 | Compaq Computer Corporation | Compression of data in read only storage and embedded systems |
US6584520B1 (en) * | 1994-06-20 | 2003-06-24 | Richard Cowart | Method for dynamically generating a file allocation table base upon files storage information on a CD-ROM for retrieving compressed files directly from the CD-ROM |
US5813017A (en) * | 1994-10-24 | 1998-09-22 | International Business Machines Corporation | System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing |
US5813011A (en) * | 1995-05-12 | 1998-09-22 | Fujitsu Limited | Storage of a compressed file containing its own compression management table |
US6577734B1 (en) * | 1995-10-31 | 2003-06-10 | Lucent Technologies Inc. | Data encryption key management system |
US5774715A (en) * | 1996-03-27 | 1998-06-30 | Sun Microsystems, Inc. | File system level compression using holes |
US6115787A (en) * | 1996-11-05 | 2000-09-05 | Hitachi, Ltd. | Disc storage system having cache memory which stores compressed data |
US6092071A (en) * | 1997-11-04 | 2000-07-18 | International Business Machines Corporation | Dedicated input/output processor method and apparatus for access and storage of compressed data |
US6145069A (en) * | 1999-01-29 | 2000-11-07 | Interactive Silicon, Inc. | Parallel decompression and compression system and method for improving storage density and access speed for non-volatile memory and embedded memory devices |
US6532121B1 (en) * | 1999-10-25 | 2003-03-11 | Hewlett-Packard Company | Compression algorithm with embedded meta-data for partial record operation augmented with expansion joints |
US6678828B1 (en) * | 2002-07-22 | 2004-01-13 | Vormetric, Inc. | Secure network file access control system |
US20040030813A1 (en) * | 2002-08-08 | 2004-02-12 | International Business Machines Corporation | Method and system for storing memory compressed data onto memory compressed disks |
US20050021657A1 (en) * | 2003-04-21 | 2005-01-27 | International Business Machines Corp. | Network system, server, data processing method and program |
Cited By (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060262851A1 (en) * | 2005-05-19 | 2006-11-23 | Celtro Ltd. | Method and system for efficient transmission of communication traffic |
US8024538B2 (en) | 2006-03-20 | 2011-09-20 | Emc Corporation | High efficiency virtualized portable archive |
US20080013365A1 (en) * | 2006-03-20 | 2008-01-17 | Emc Corporation | High efficiency portable archive |
US7747831B2 (en) | 2006-03-20 | 2010-06-29 | Emc Corporation | High efficiency portable archive and data protection using a virtualization layer |
US20100205393A1 (en) * | 2006-03-20 | 2010-08-12 | Emc Corporation | High efficiency portable archive |
US7831787B1 (en) | 2006-03-20 | 2010-11-09 | Emc Corporation | High efficiency portable archive with virtualization |
US9317222B1 (en) * | 2006-04-24 | 2016-04-19 | Emc Corporation | Centralized content addressed storage |
US9235477B1 (en) * | 2006-04-24 | 2016-01-12 | Emc Corporation | Virtualized backup solution |
US20070294320A1 (en) * | 2006-05-10 | 2007-12-20 | Emc Corporation | Automated priority restores |
US8065273B2 (en) | 2006-05-10 | 2011-11-22 | Emc Corporation | Automated priority restores |
US9684739B1 (en) | 2006-05-11 | 2017-06-20 | EMC IP Holding Company LLC | View generator for managing data storage |
US20080177934A1 (en) * | 2007-01-24 | 2008-07-24 | Samsung Electronics. Co., Ltd. | Memory systems having a multilevel cell flash memory and programming methods thereof |
US7755950B2 (en) * | 2007-01-24 | 2010-07-13 | Samsung Electronics Co., Ltd. | Programming methods of memory systems having a multilevel cell flash memory |
US8001278B2 (en) * | 2007-09-28 | 2011-08-16 | Intel Corporation | Network packet payload compression |
US20090089454A1 (en) * | 2007-09-28 | 2009-04-02 | Ramakrishna Huggahalli | Network packet payload compression |
US20090187643A1 (en) * | 2008-01-23 | 2009-07-23 | Hang Ng | System and Method for Configuring Networked Enterprise Information Handling System Solutions From a Product and Options Template |
US11436210B2 (en) | 2008-09-05 | 2022-09-06 | Commvault Systems, Inc. | Classification of virtualization data |
US9075534B2 (en) | 2009-05-25 | 2015-07-07 | Hitachi, Ltd. | Computer system and its data control method |
US8396835B2 (en) * | 2009-05-25 | 2013-03-12 | Hitachi, Ltd. | Computer system and its data control method |
US20110178988A1 (en) * | 2009-05-25 | 2011-07-21 | Hitachi, Ltd. | Computer system and its data control method |
US9218349B2 (en) | 2009-07-27 | 2015-12-22 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US9229941B2 (en) | 2009-07-27 | 2016-01-05 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US9256604B2 (en) * | 2009-07-27 | 2016-02-09 | International Business Machines Corporation | Method and system for transformation of logical data objects for storage |
US20130024632A1 (en) * | 2009-07-27 | 2013-01-24 | Jonathan Amit | Method and system for transformation of logical data objects for storage |
US11449394B2 (en) | 2010-06-04 | 2022-09-20 | Commvault Systems, Inc. | Failover systems and methods for performing backup operations, including heterogeneous indexing and load balancing of backup and indexing resources |
US20130262801A1 (en) * | 2011-09-30 | 2013-10-03 | Commvault Systems, Inc. | Information management of virtual machines having mapped storage devices |
US9116633B2 (en) * | 2011-09-30 | 2015-08-25 | Commvault Systems, Inc. | Information management of virtual machines having mapped storage devices |
US10733143B2 (en) | 2012-12-21 | 2020-08-04 | Commvault Systems, Inc. | Systems and methods to identify unprotected virtual machines |
US11544221B2 (en) | 2012-12-21 | 2023-01-03 | Commvault Systems, Inc. | Systems and methods to identify unprotected virtual machines |
US11099886B2 (en) | 2012-12-21 | 2021-08-24 | Commvault Systems, Inc. | Archiving virtual machines in a data storage system |
US10824464B2 (en) | 2012-12-21 | 2020-11-03 | Commvault Systems, Inc. | Archiving virtual machines in a data storage system |
US11468005B2 (en) | 2012-12-21 | 2022-10-11 | Commvault Systems, Inc. | Systems and methods to identify unprotected virtual machines |
US11922197B2 (en) | 2013-01-08 | 2024-03-05 | Commvault Systems, Inc. | Virtual server agent load balancing |
US10896053B2 (en) | 2013-01-08 | 2021-01-19 | Commvault Systems, Inc. | Virtual machine load balancing |
US11734035B2 (en) | 2013-01-08 | 2023-08-22 | Commvault Systems, Inc. | Virtual machine load balancing |
US11010011B2 (en) | 2013-09-12 | 2021-05-18 | Commvault Systems, Inc. | File manager integration with virtualization in an information management system with an enhanced storage manager, including user control and storage management of virtual machines |
US11321189B2 (en) | 2014-04-02 | 2022-05-03 | Commvault Systems, Inc. | Information management by a media agent in the absence of communications with a storage manager |
US11625439B2 (en) | 2014-07-16 | 2023-04-11 | Commvault Systems, Inc. | Volume or virtual machine level backup and generating placeholders for virtual machine files |
US10650057B2 (en) | 2014-07-16 | 2020-05-12 | Commvault Systems, Inc. | Volume or virtual machine level backup and generating placeholders for virtual machine files |
US10776209B2 (en) | 2014-11-10 | 2020-09-15 | Commvault Systems, Inc. | Cross-platform virtual machine backup and replication |
US11422709B2 (en) | 2014-11-20 | 2022-08-23 | Commvault Systems, Inc. | Virtual machine change block tracking |
US10896104B2 (en) | 2016-09-30 | 2021-01-19 | Commvault Systems, Inc. | Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, using ping monitoring of target virtual machines |
US11429499B2 (en) | 2016-09-30 | 2022-08-30 | Commvault Systems, Inc. | Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, including operations by a master monitor node |
US10747630B2 (en) | 2016-09-30 | 2020-08-18 | Commvault Systems, Inc. | Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, including operations by a master monitor node |
US10824459B2 (en) | 2016-10-25 | 2020-11-03 | Commvault Systems, Inc. | Targeted snapshot based on virtual machine location |
US11934859B2 (en) | 2016-10-25 | 2024-03-19 | Commvault Systems, Inc. | Targeted snapshot based on virtual machine location |
US11416280B2 (en) | 2016-10-25 | 2022-08-16 | Commvault Systems, Inc. | Targeted snapshot based on virtual machine location |
US11436202B2 (en) | 2016-11-21 | 2022-09-06 | Commvault Systems, Inc. | Cross-platform virtual machine data and memory backup and replication |
US10877851B2 (en) | 2017-03-24 | 2020-12-29 | Commvault Systems, Inc. | Virtual machine recovery point selection |
US10896100B2 (en) | 2017-03-24 | 2021-01-19 | Commvault Systems, Inc. | Buffered virtual machine replication |
US10983875B2 (en) | 2017-03-24 | 2021-04-20 | Commvault Systems, Inc. | Time-based virtual machine reversion |
US11526410B2 (en) | 2017-03-24 | 2022-12-13 | Commvault Systems, Inc. | Time-based virtual machine reversion |
US11669414B2 (en) | 2017-03-29 | 2023-06-06 | Commvault Systems, Inc. | External dynamic virtual machine synchronization |
US11249864B2 (en) | 2017-03-29 | 2022-02-15 | Commvault Systems, Inc. | External dynamic virtual machine synchronization |
US10877928B2 (en) | 2018-03-07 | 2020-12-29 | Commvault Systems, Inc. | Using utilities injected into cloud-based virtual machines for speeding up virtual machine backup operations |
US11550680B2 (en) | 2018-12-06 | 2023-01-10 | Commvault Systems, Inc. | Assigning backup resources in a data storage management system based on failover of partnered data storage resources |
US11947990B2 (en) | 2019-01-30 | 2024-04-02 | Commvault Systems, Inc. | Cross-hypervisor live-mount of backed up virtual machine data |
US11467863B2 (en) | 2019-01-30 | 2022-10-11 | Commvault Systems, Inc. | Cross-hypervisor live mount of backed up virtual machine data |
US10768971B2 (en) | 2019-01-30 | 2020-09-08 | Commvault Systems, Inc. | Cross-hypervisor live mount of backed up virtual machine data |
US11467753B2 (en) | 2020-02-14 | 2022-10-11 | Commvault Systems, Inc. | On-demand restore of virtual machine data |
US11714568B2 (en) | 2020-02-14 | 2023-08-01 | Commvault Systems, Inc. | On-demand restore of virtual machine data |
US11442768B2 (en) | 2020-03-12 | 2022-09-13 | Commvault Systems, Inc. | Cross-hypervisor live recovery of virtual machines |
US11663099B2 (en) | 2020-03-26 | 2023-05-30 | Commvault Systems, Inc. | Snapshot-based disaster recovery orchestration of virtual machine failover and failback operations |
US11500669B2 (en) | 2020-05-15 | 2022-11-15 | Commvault Systems, Inc. | Live recovery of virtual machines in a public cloud computing environment |
US11748143B2 (en) | 2020-05-15 | 2023-09-05 | Commvault Systems, Inc. | Live mount of virtual machines in a public cloud computing environment |
US11656951B2 (en) | 2020-10-28 | 2023-05-23 | Commvault Systems, Inc. | Data loss vulnerability detection |
Also Published As
Publication number | Publication date |
---|---|
US20110219153A1 (en) | 2011-09-08 |
US20110218977A1 (en) | 2011-09-08 |
US20060136365A1 (en) | 2006-06-22 |
US8347003B2 (en) | 2013-01-01 |
US8347004B2 (en) | 2013-01-01 |
US7424482B2 (en) | 2008-09-09 |
US8856409B2 (en) | 2014-10-07 |
US20110219186A1 (en) | 2011-09-08 |
US7970965B2 (en) | 2011-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8656075B2 (en) | Method and system for compression of files for storage and operation on compressed files | |
US7970965B2 (en) | Method and system for compression of data for block mode access storage | |
US8327050B2 (en) | Systems and methods for compressing files for storage and operation on compressed files | |
CA2564844C (en) | Method and system for compression of files for storage and operation on compressed files | |
US20060190643A1 (en) | Method and system for compression of data for block mode access storage | |
US20060230014A1 (en) | Method and system for compression of files for storage and operation on compressed files | |
US8190836B1 (en) | Saving multiple snapshots without duplicating common blocks to protect the entire contents of a volume | |
US8126847B1 (en) | Single file restore from image backup by using an independent block list for each file | |
US7844643B2 (en) | Storage management system with integrated continuous data protection and remote copy | |
US7877554B2 (en) | Method and system for block reallocation | |
ZA200608760B (en) | Method and system for compression of files for storage and operation on compressed files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: KREOS CAPITAL III LIMITED Free format text: SECURITY AGREEMENT;ASSIGNORS:STORWIZE, INC.;STORWIZE LTD.;REEL/FRAME:022537/0686 Effective date: 20090323 Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNORS:STORWIZE, INC.;STORWIZE LTD.;REEL/FRAME:022537/0686 Effective date: 20090323 Owner name: SILICON VALLEY BANK,CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNORS:STORWIZE, INC.;STORWIZE LTD.;REEL/FRAME:022537/0686 Effective date: 20090323 Owner name: KREOS CAPITAL III LIMITED, JERSEY Free format text: SECURITY AGREEMENT;ASSIGNORS:STORWIZE, INC.;STORWIZE LTD.;REEL/FRAME:022537/0686 Effective date: 20090323 |
|
AS | Assignment |
Owner name: STORWIZE, INC., MASSACHUSETTS Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:024930/0960 Effective date: 20100831 Owner name: STORWIZE, LTD., MASSACHUSETTS Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:024930/0960 Effective date: 20100831 |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:KREOS CAPITAL III LIMITED;REEL/FRAME:027496/0815 Effective date: 20100728 |
|
CC | Certificate of correction | ||
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20150628 |